Hacking AT&T U-verse Router (Gain Access)

10 Apr

I came across a network with internet connection provided by AT&T U-verse. Out of my curiosity, I wanted to access the router’s configuration manager, thus I needed the gateway ip address.

  1. Tried with no luck. And since I was using my Mac, ifconfig command doesn’t give me the gateway ip address. Workaround is to trace route

    The ‘home’ route, which is is the gateway ip address.
  2. Go to on any browser.
    Apparently, AT&T U-verse default setting is using above ip address as configuration manager portal. Also, when you access the configuration manager portal, there is no password needed. Only certain section will require password.
  3. Configuration Manager Portal.
    Even without password, you already have access to a lot of information about the network.
  4. Browse to Settings > LAN > Wireless, and I saw:

Happy hacking!


Posted by on April 10, 2011 in General


Tags: , ,

7 responses to “Hacking AT&T U-verse Router (Gain Access)

  1. fuuuu

    September 29, 2011 at 8:45 pm

    This isn’t hacking access.
    I need a shell on this turd of a router.

  2. Battlecat

    May 3, 2013 at 8:33 am

    Dude, thats not hacking you could have just run “netstat -nr | grep default” from terminal and your computer would have printed out the IP for you.

  3. jshall

    December 10, 2013 at 9:15 pm

    It is also not hacking because you couldn’t get onto “the random AT&T network you found” to do the trace route or get on without knowing the network password to the wireless. And you didn’t need a trace route just got to Google and type in what is the router gateway IP for AT&T UVerse router.

  4. Greg

    September 23, 2014 at 3:15 pm

    Nothing about this is hacking…

  5. Dustin

    October 30, 2014 at 9:54 am


  6. brian

    April 2, 2015 at 10:39 pm

    dude if you look on the side of your uverse modem you will see a yellow sticker with the default ip for configuring your router / modem. i mean this is not hacking! hacking is kali linux and hack tools using commands like airmon-ng airmon-ng start wlan0 airodump-ng wlan0 airodump-ng –c [channel] –bssid [bssid] –w /root/Desktop/ aireplay-ng –0 2 –a [router bssid] –c [client bssid] mon0 and wpa wpa2 hand-shacks that sort of activety is called hacking aircrack-ng -a2 -b [router bssid] -w [path to wordlist] /root/Desktop/*.cap and and after cracking the pass-phrase then you can use the default router ip to gain access to the configure there router / modem these commands and tools should only be used for security purposes

    • top kek

      July 25, 2015 at 8:14 pm

      We got a cool guy here


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s


Get every new post delivered to your Inbox.

Join 62 other followers

%d bloggers like this: