[ Orbic RCL400 Custom Firmware ]

📋 Feature Documentation

🏠 Dashboard

The home page provides a real-time overview of your device status and direct modem access.

System Stats

Displays key metrics at a glance:

AT Command Interface

Send raw AT commands directly to the modem. Examples:

Command Description
ATI Display modem information
AT+CSQ Check signal strength
AT+COPS? Current network operator
AT+CREG? Network registration status
AT+CGSN Get IMEI number
AT+CIMI Get IMSI number

🌐 Network Analysis

View detailed network information and manage TTL settings.

Magic TTL Fix

Set a custom TTL (Time To Live) value for outgoing packets. This helps mask hotspot traffic from carriers that detect tethering.

💡 Tip: A TTL of 65 is commonly used to disguise hotspot traffic as direct phone traffic.

Interfaces

Shows all network interfaces with their IP addresses, similar to running ip addr.

Clients

Displays the ARP table showing all devices connected to your hotspot, including their MAC and IP addresses.

Connections

Active TCP/UDP connections through the device, showing source, destination, and connection state.

🔒 Privacy Tools

Protect your identity and block unwanted content.

MAC Spoofing

Change your device's MAC address to avoid tracking. Enter a new MAC in the format XX:XX:XX:XX:XX:XX.

⚠️ Note: This temporarily brings the WiFi interface down, which may disconnect clients briefly.

AdBlock

Enable DNS-level ad blocking by redirecting known ad domains to 0.0.0.0 via the hosts file. This affects all devices connected to the hotspot.

Currently blocks:

The hosts file can be extended by adding more domains to /data/hosts.

📱 SMS Manager

Send text messages using the hotspot's cellular modem.

Sending Messages

Enter a phone number (with country code for international) and your message. The firmware uses AT commands to queue the SMS.

Viewing Inbox

To view received messages, use the stock Orbic portal at:

http://192.168.1.1/common/shortmessage.html
💡 Reply Feature: When clicking reply from the inbox link, the phone number will be pre-filled in the send form.

🔧 Hacking Tools

Network reconnaissance and defense utilities.

📡 IMSI Catcher Detector

Enhanced cell info display with anomaly detection for fake cell towers (IMSI catchers / Stingrays).

Displays in styled info cards:

Anomaly Detection

Automatic warnings for potential IMSI catcher activity:

⚠️ Disclaimer: This is a basic detector. Professional IMSI catchers may not be detected.

🔍 Port Scanner

Scan a target IP address for open ports. Enter the target IP and a comma-separated list of ports to scan.

Example: 192.168.1.1 with ports 22,80,443,8080

Uses netcat under the hood for connection testing.

🛡️ Firewall Manager

Manage iptables rules through a simple interface.

Current INPUT chain rules are displayed below the forms.

📍 GPS Tracker

Track your location using GPS from connected devices (phone/laptop) via browser geolocation or cell tower lookup.

Auto-GPS on Every Page

A GPS indicator appears in the bottom-right corner of every page, polling every 30 seconds:

Cell Tower Lookup (OpenCellID)

When browser geolocation fails or isn't available, DagShell automatically uses cell tower information to get approximate coordinates:

  1. Device reads cell info from modem (MCC, MNC, LAC, CID)
  2. Your browser calls the OpenCellID API
  3. Coordinates are sent back to the device
💡 Setup: Configure your OpenCellID token in Settings to enable cell tower lookup.

Browser Geolocation

If your browser supports geolocation and you grant permission, high-accuracy GPS coordinates from your phone/laptop will be used.

GPS JSON API

Access GPS data programmatically via:

https://192.168.1.1:8443/?cmd=gps_json

Returns JSON: {"has_fix":1,"lat":"...","lon":"...","source":"Browser GPS","cell":{...}}

📶 Wardriver

Scan and log WiFi networks in Wigle-compatible CSV format with GPS coordinates.

Automatic GPS Waiting

The wardrive loop will wait for a GPS fix before starting to scan. This ensures all logged networks have valid coordinates (no 0,0 entries).

💡 Tip: Keep a browser page open on your phone to provide continuous GPS updates to the device.

Single Scan

Performs a one-time WiFi scan using wlan1 and displays discovered networks with BSSID, SSID, RSSI, and encryption type.

Wardrive Loop

Starts continuous scanning in the background (every 5 seconds), logging new networks to a timestamped CSV file in /data/. Each scan uses the current GPS coordinates.

Browser-Based Wigle Upload

Upload wardrive files directly to Wigle.net from the Files page:

  1. Click the Upload button next to any wardrive CSV
  2. Your browser downloads the file and uploads to Wigle API
  3. On success, the file is automatically deleted
💡 Setup: Configure your Wigle API Name and Token in Settings.

CSV Format

Logs are saved in Wigle-compatible format:

MAC,SSID,AuthMode,FirstSeen,Channel,RSSI,Lat,Lon,Alt,Accuracy,Type

📁 File Explorer

Browse, download, upload, and delete files from the device's /data/ directory.

Multi-Select Operations

Use checkboxes to select multiple files, then:

Quick actions: Select All / Select None buttons for convenience.

Download Files

Click the "📥" button to download any file from the device. File sizes are shown in KB/MB format.

Upload to Wigle

Wardrive CSV files have an "Upload" button that uploads directly to Wigle.net through your browser. The file is automatically deleted on successful upload.

Delete Files

Remove files using the "🗑️" button or select multiple and use batch delete.

💻 Web Terminal (SHELL)

Execute shell commands directly on the device through the web interface.

Enter any Linux command and see the output. Useful for:

⚠️ Caution: This provides root shell access. Use carefully.

📞 USSD Executor

Send USSD codes to check account balance, activate plans, or access carrier services.

Enter a USSD code (e.g., *#06#, *100#) and submit.

Uses AT+CUSD command to communicate with the carrier network.

📊 Data Usage Monitor (USAGE)

Track cellular data usage per session with historical logging.

Current Session

Displays real-time data usage with styled cards:

Usage History

Save sessions to build a usage history over time:

👥 Connected Clients (CLIENTS)

Track devices that connect to your hotspot.

Displays a list of clients with their MAC addresses, IP addresses, and connection times.

Client connections are logged to /data/client_log.txt for historical reference.

⚙️ Settings Persistence

Configure DagShell options that persist across reboots.

Saved Settings

Settings are stored in /data/dagshell_config and applied by the boot script.

⚙️ Technical Details

Architecture

DagShell is a single-threaded HTTPS server written in C. It listens on port 8443 and serves dynamically generated HTML pages.

Modem Communication

AT commands are sent through /dev/smd8 (shared memory device). The port is opened with retries to handle busy states.

Binary Size

The statically-linked ARM binary is approximately 200KB, allowing quick transfer over the network.

Component Details
HTTPS Port 8443
Modem Port /dev/smd8
Binary /tmp/orbic_app
Threading Single-threaded
Linking Static (no libc dependency)