{% extends "base.html" %} {% block title %}AUTARCH — Starlink Hacking{% endblock %} {% block content %}

Discover Dish

Dish Status

Network & WiFi Clients

Port Scan

Enumerate gRPC Methods

Quick Actions

Send commands to the Starlink dish via gRPC. Use with caution on production hardware.

Custom gRPC Call

Traffic Interception (ARP Spoof)

ARP spoofing between dish and gateway to intercept traffic. Requires arpspoof or ettercap.

DNS Spoofing

Redirect DNS queries for a domain to a controlled IP. Requires dnsspoof or ettercap.

WiFi Client Deauthentication

Send deauth packets to disconnect WiFi clients from the Starlink router. Requires aircrack-ng or mdk4.

MITM WiFi Clients

Firmware Version Check

Check the running firmware version against known vulnerable versions.

Firmware Analysis

Upload a firmware image for signature scanning, entropy analysis, and string extraction.

Debug Interface Scan

RF Downlink Analysis

Ku-band downlink analysis (10.7-12.7 GHz). Requires SDR hardware (HackRF or RTL-SDR with LNB).

Jamming Detection

Check for signal jamming indicators by analyzing dish diagnostics (drop rate, latency, throughput, SNR).

Known Vulnerabilities

{% endblock %}