Un exploit pour les périphériques D-Link peut être réalisé à l’aide du protocole d’administration réseau domestique (HNAP). Cela permet à un attaquant d’exécuter des commandes à distance sur un périphérique D-Link. Cela peut être fait en envoyant une demande HNAP spécialement conçue à un périphérique D-Link et en lui demandant d’exécuter des commandes. Les commandes peuvent inclure des fonctions d’administration telles que la modification des paramètres réseau, le déploiement de logiciels malveillants et la récupération de données sensibles.

Home Network Administration Protocol

proprietary network protocol
Question book-new.svg
This article relies excessively on references for primary sources. Improve this article by adding secondary or tertiary sources.
Find fonts: “Home Network Administration Protocol”News · newspapers · books · studious · JSTOR
(February 2014) (Learn how and when to remove this template message)

Home Network Administration Protocol (HNAP) it is a owner network protocol invented by Pure Networks, Inc. and acquired by Cisco Systems that allows the identification, configuration and management of network devices. The HNAP is based on SOAP.

As of January 2010, vulnerabilities were discovered in several D Link network devices where HNAP authentication can be bypassed.

2014 HNAP is used by “The Moon” worm that infects linksys routers.

References

External Links


Source: Home Network Administration Protocol
Wikipedia

Video about Et Exploit D-Link Devices Home Network Administration Protocol Command Execution

TP Link Vulnerability –The Moon Worm– (Remote Code Execution) using Routersploit Framework

Question about Et Exploit D-Link Devices Home Network Administration Protocol Command Execution

If you have any questions about Et Exploit D-Link Devices Home Network Administration Protocol Command Execution, please let us know, all your questions or suggestions will help us improve in the following articles!

The article Et Exploit D-Link Devices Home Network Administration Protocol Command Execution was compiled by me and my team from many sources. If you find the article Et Exploit D-Link Devices Home Network Administration Protocol Command Execution helpful to you, please support the team Like or Share!

Rate Articles Home Network Administration Protocol

Rate: 4-5 stars
Ratings: 8137
Views: 39506307

Search keywords Et Exploit D-Link Devices Home Network Administration Protocol Command Execution

1. Network Security
2. IP Address
3. TCP/IP
4. DHCP
5. NAT
6. DNS
7. Wireless Network
8. Network Topology
9. Firewall
10. Network Monitoring
#Home #Network #Administration #Protocol