FIXED: Was trying to spoof...dum dum DUMMMM
So I have a couple of slims...
SlimA: Trintity RGH'ed liteon 0225 (tx board)
SlimB: Trinity liteon 0272 (spudnik'ed)
The 272 drive was working perfectly until I updated it to lt2.0, in which now it doesn't open/close at first...reflashed it a few times and it started opening and closing but wont even try to read any disks.
I decided that maybe I'd just use the other slim's drive, as I am running it on RGH and have yet to use the drive for anything at all.
I have the correct dvd key, and a full firmware pull from stock on the SlimB, however it is from before the 14599 dash update. I have the copy of lt 1.91, as well as 1.92 that it was running as well.
I flashed the drive back to stock, updated the xbox to the new dash for Live use, then flashed lt2.0 back onto it when it started having these issues.
When I have flashed the SlimB drive to match the SlimA firmware, I have used the u as well as the 225/272 firmwares and each of them say "Play DVD" on Backups, as well as originals. Which leads me to think the key could be wrong however I've never changed from using the original stock pull for the key.
I've read a few places that you need a complete pull from the drive for slim's, as more than just the dvd key is needed now...however I do NOT have a full pull from after the dash update, just before.
I've been pulling and flashing to these two drives all night into today, so my log is HUGE. Here is a "updated" log showing the factory pulled firmware as well as the lt firmware. Any idea's guys?
As you can see "Parse Failed" appeers after trying to flash from the first stock firmware pull.
So I have a couple of slims...
SlimA: Trintity RGH'ed liteon 0225 (tx board)
SlimB: Trinity liteon 0272 (spudnik'ed)
The 272 drive was working perfectly until I updated it to lt2.0, in which now it doesn't open/close at first...reflashed it a few times and it started opening and closing but wont even try to read any disks.
I decided that maybe I'd just use the other slim's drive, as I am running it on RGH and have yet to use the drive for anything at all.
I have the correct dvd key, and a full firmware pull from stock on the SlimB, however it is from before the 14599 dash update. I have the copy of lt 1.91, as well as 1.92 that it was running as well.
I flashed the drive back to stock, updated the xbox to the new dash for Live use, then flashed lt2.0 back onto it when it started having these issues.
When I have flashed the SlimB drive to match the SlimA firmware, I have used the u as well as the 225/272 firmwares and each of them say "Play DVD" on Backups, as well as originals. Which leads me to think the key could be wrong however I've never changed from using the original stock pull for the key.
I've read a few places that you need a complete pull from the drive for slim's, as more than just the dvd key is needed now...however I do NOT have a full pull from after the dash update, just before.
I've been pulling and flashing to these two drives all night into today, so my log is HUGE. Here is a "updated" log showing the factory pulled firmware as well as the lt firmware. Any idea's guys?
Warning
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
JungleFlasher 0.1.91 Beta (300)
Session Started Thu Jan 12 12:57:02 2012
This is a 32 bit process running on 2 x 32 bit CPUs
X360USB PRO detected, Version 0.18
Found 1 I/O Ports.
Found 0 Com Ports.
Found 6 windows drives A: C: D: X: Y: Z:
Found 1 CD/DVD drives D:
Drive is Slim Lite-On..
Key found in KeyDB at record (38 - firmware)
Key is: E8D33AF9D3A4EA53221FE57ACDA0B927
Key has been tested and verified, thanks C4eva !
Sending Vendor Intro to port 0x0000
Status 0x51
Re-sending Vendor Intro:
....................................
Serial flash found with Status 0x72
Sending Device ID request to port 0x0000
Spi Status: 0x8C
Manufacturer ID: 0xEF
Device ID: 0x11
Flash Name: Winbond/NEX(W25P20/NX25P20)
Flash Size: 262144 bytes
Sending Spi UnLock request to Port 0x0000
Spi Status: 0x00
Loading firmware file X:\Jungle Flasher\JungleFlasher v0.1.91 Beta (300)\firmware\Frey Family Slim 250GB Second Pass Lite-OFW.bin
MD5 hash: ca2be854c2fd7f8c0a1f5b2b08732bae
Drive key @ n/a 817B97AE2CAE37A2940D7558000B8AE7
Firmware Osig: [PLDS DG-16D4S 0225]
Firmware is: LT-Plus 1.92
Auto-Loading firmware file \\psf\External\Jungle Flasher\JungleFlasher v0.1.91 Beta (300)\firmware\LTPlus-0225-v2.0.bin
MD5 hash: 1012021472620cad9adf1f838497668e
Genuine LT plus v2.0
Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
Firmware Osig: [PLDS DG-16D4S 0225]
Firmware is: LT-Plus 2.0
Spoofing Target
DVD Key copied to target
Key Sector copied from Source to Target
Target is LT - ID strings not copied to Target
Loading firmware file X:\Jungle Flasher\JungleFlasher v0.1.91 Beta (300)\firmware\LTPlus-0225-v2.0u.bin
MD5 hash: a28aa0c2386925550f05b4b5af62d81b
Genuine LT plus v2.0 (9504 upgrade)
Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
Firmware Osig: [PLDS DG-16D4S 0225]
Firmware is: LT-Plus 2.0
Spoofing Target
DVD Key copied to target
Key Sector copied from Source to Target
Target is LT - ID strings not copied to Target
Getting Status from port 0x0000
SPi flash found with Status 0x72
Sending Chip Erase to Port 0x0000
Erasing:
Writing target buffer to flash
Writing Bank 0: ................
Writing Bank 1: ................
Writing Bank 2: ................
Writing Bank 3: ................
............
Flash Verification Test !
Reading Bank 0: ................
Reading Bank 1: ................
Reading Bank 2: ................
Reading Bank 3: ................
Dumped in 14938mS
Write verified OK !
Restoring sector 0x3E000.
Sending Sector Erase to Port 0x0000
Erasing: 0x3E000
Writing: 0x3E000
............
Authorised !
................
Restore verified OK !
Drive is Slim Lite-On..
Key found in KeyDB at record (37 - firmware)
Key is: 817B97AE2CAE37A2940D7558000B8AE7
Key has been tested and verified, thanks C4eva !
Sending Vendor Intro to port 0x0000
Status 0x51
Re-sending Vendor Intro:
..................................................
Serial flash found with Status 0x72
Sending Device ID request to port 0x0000
Spi Status: 0x00
Manufacturer ID: 0xEF
Device ID: 0x11
Flash Name: Winbond/NEX(W25P20/NX25P20)
Flash Size: 262144 bytes
Sending Spi Lock request to Port 0x0000
Spi Status: 0x8C
Sending Vendor Outro to port 0x0000
Drive is Slim Lite-On..
Key found in KeyDB at record (37 - firmware)
Key is: 817B97AE2CAE37A2940D7558000B8AE7
Key has been tested and verified, thanks C4eva !
Loading firmware file X:\Jungle Flasher\JungleFlasher v0.1.91 Beta (300)\firmware\Frey Family Slim 250GB Dummy.bin
MD5 hash: b85dd9efda954067de8f2c260061ce7a
Inquiry string found
Identify string found
Drive key @ 0xA030 817B97AE2CAE37A2940D7558000B8AE7
Firmware Osig: [PLDS DG-16D4S 0225]
Firmware is: SlimKey Extract
Drive is Slim Lite-On..
Key found in KeyDB at record (37 - firmware)
Key is: 817B97AE2CAE37A2940D7558000B8AE7
Key has been tested and verified, thanks C4eva !
Loading firmware file X:\Jungle Flasher\JungleFlasher v0.1.91 Beta (300)\firmware\Frey Family Slim 250GB Dummy.bin
MD5 hash: b85dd9efda954067de8f2c260061ce7a
Inquiry string found
Identify string found
Parse Failed !
Loading firmware file X:\Jungle Flasher\JungleFlasher v0.1.91 Beta (300)\firmware\Dummyflasher.bin
MD5 hash: 2b883268b9d7ca2e6433c8372270fc6a
Inquiry string found
Identify string found
Drive key @ 0xA030 E8D33AF9D3A4EA53221FE57ACDA0B927
Firmware Osig: [PLDS DG-16D4S 0272]
Firmware is: SlimKey Extract
Loading firmware file X:\Jungle Flasher\JungleFlasher v0.1.91 Beta (300)\firmware\LTPlus-0272-v2.0 2.bin
MD5 hash: e89c22ad8eecf634a3b27510901999c8
Genuine LT plus v2.0
Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
Firmware Osig: [PLDS DG-16D4S 0272]
Firmware is: LT-Plus 2.0
Spoofing Target
DVD Key copied to target
Key Sector copied from Source to Target
Target is LT - ID strings not copied to Target
Loading firmware file X:\Jungle Flasher\JungleFlasher v0.1.91 Beta (300)\firmware\Dummy OmarSlim.bin
MD5 hash: b85dd9efda954067de8f2c260061ce7a
Inquiry string found
Identify string found
Drive key @ 0xA030 817B97AE2CAE37A2940D7558000B8AE7
Firmware Osig: [PLDS DG-16D4S 0225]
Firmware is: SlimKey Extract
JungleFlasher 0.1.91 Beta (300)
Session Started Thu Jan 12 12:57:02 2012
This is a 32 bit process running on 2 x 32 bit CPUs
X360USB PRO detected, Version 0.18
Found 1 I/O Ports.
Found 0 Com Ports.
Found 6 windows drives A: C: D: X: Y: Z:
Found 1 CD/DVD drives D:
Drive is Slim Lite-On..
Key found in KeyDB at record (38 - firmware)
Key is: E8D33AF9D3A4EA53221FE57ACDA0B927
Key has been tested and verified, thanks C4eva !
Sending Vendor Intro to port 0x0000
Status 0x51
Re-sending Vendor Intro:
....................................
Serial flash found with Status 0x72
Sending Device ID request to port 0x0000
Spi Status: 0x8C
Manufacturer ID: 0xEF
Device ID: 0x11
Flash Name: Winbond/NEX(W25P20/NX25P20)
Flash Size: 262144 bytes
Sending Spi UnLock request to Port 0x0000
Spi Status: 0x00
Loading firmware file X:\Jungle Flasher\JungleFlasher v0.1.91 Beta (300)\firmware\Frey Family Slim 250GB Second Pass Lite-OFW.bin
MD5 hash: ca2be854c2fd7f8c0a1f5b2b08732bae
Drive key @ n/a 817B97AE2CAE37A2940D7558000B8AE7
Firmware Osig: [PLDS DG-16D4S 0225]
Firmware is: LT-Plus 1.92
Auto-Loading firmware file \\psf\External\Jungle Flasher\JungleFlasher v0.1.91 Beta (300)\firmware\LTPlus-0225-v2.0.bin
MD5 hash: 1012021472620cad9adf1f838497668e
Genuine LT plus v2.0
Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
Firmware Osig: [PLDS DG-16D4S 0225]
Firmware is: LT-Plus 2.0
Spoofing Target
DVD Key copied to target
Key Sector copied from Source to Target
Target is LT - ID strings not copied to Target
Loading firmware file X:\Jungle Flasher\JungleFlasher v0.1.91 Beta (300)\firmware\LTPlus-0225-v2.0u.bin
MD5 hash: a28aa0c2386925550f05b4b5af62d81b
Genuine LT plus v2.0 (9504 upgrade)
Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
Firmware Osig: [PLDS DG-16D4S 0225]
Firmware is: LT-Plus 2.0
Spoofing Target
DVD Key copied to target
Key Sector copied from Source to Target
Target is LT - ID strings not copied to Target
Getting Status from port 0x0000
SPi flash found with Status 0x72
Sending Chip Erase to Port 0x0000
Erasing:
Writing target buffer to flash
Writing Bank 0: ................
Writing Bank 1: ................
Writing Bank 2: ................
Writing Bank 3: ................
............
Flash Verification Test !
Reading Bank 0: ................
Reading Bank 1: ................
Reading Bank 2: ................
Reading Bank 3: ................
Dumped in 14938mS
Write verified OK !
Restoring sector 0x3E000.
Sending Sector Erase to Port 0x0000
Erasing: 0x3E000
Writing: 0x3E000
............
Authorised !
................
Restore verified OK !
Drive is Slim Lite-On..
Key found in KeyDB at record (37 - firmware)
Key is: 817B97AE2CAE37A2940D7558000B8AE7
Key has been tested and verified, thanks C4eva !
Sending Vendor Intro to port 0x0000
Status 0x51
Re-sending Vendor Intro:
..................................................
Serial flash found with Status 0x72
Sending Device ID request to port 0x0000
Spi Status: 0x00
Manufacturer ID: 0xEF
Device ID: 0x11
Flash Name: Winbond/NEX(W25P20/NX25P20)
Flash Size: 262144 bytes
Sending Spi Lock request to Port 0x0000
Spi Status: 0x8C
Sending Vendor Outro to port 0x0000
Drive is Slim Lite-On..
Key found in KeyDB at record (37 - firmware)
Key is: 817B97AE2CAE37A2940D7558000B8AE7
Key has been tested and verified, thanks C4eva !
Loading firmware file X:\Jungle Flasher\JungleFlasher v0.1.91 Beta (300)\firmware\Frey Family Slim 250GB Dummy.bin
MD5 hash: b85dd9efda954067de8f2c260061ce7a
Inquiry string found
Identify string found
Drive key @ 0xA030 817B97AE2CAE37A2940D7558000B8AE7
Firmware Osig: [PLDS DG-16D4S 0225]
Firmware is: SlimKey Extract
Drive is Slim Lite-On..
Key found in KeyDB at record (37 - firmware)
Key is: 817B97AE2CAE37A2940D7558000B8AE7
Key has been tested and verified, thanks C4eva !
Loading firmware file X:\Jungle Flasher\JungleFlasher v0.1.91 Beta (300)\firmware\Frey Family Slim 250GB Dummy.bin
MD5 hash: b85dd9efda954067de8f2c260061ce7a
Inquiry string found
Identify string found
Parse Failed !
Loading firmware file X:\Jungle Flasher\JungleFlasher v0.1.91 Beta (300)\firmware\Dummyflasher.bin
MD5 hash: 2b883268b9d7ca2e6433c8372270fc6a
Inquiry string found
Identify string found
Drive key @ 0xA030 E8D33AF9D3A4EA53221FE57ACDA0B927
Firmware Osig: [PLDS DG-16D4S 0272]
Firmware is: SlimKey Extract
Loading firmware file X:\Jungle Flasher\JungleFlasher v0.1.91 Beta (300)\firmware\LTPlus-0272-v2.0 2.bin
MD5 hash: e89c22ad8eecf634a3b27510901999c8
Genuine LT plus v2.0
Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
Firmware Osig: [PLDS DG-16D4S 0272]
Firmware is: LT-Plus 2.0
Spoofing Target
DVD Key copied to target
Key Sector copied from Source to Target
Target is LT - ID strings not copied to Target
Loading firmware file X:\Jungle Flasher\JungleFlasher v0.1.91 Beta (300)\firmware\Dummy OmarSlim.bin
MD5 hash: b85dd9efda954067de8f2c260061ce7a
Inquiry string found
Identify string found
Drive key @ 0xA030 817B97AE2CAE37A2940D7558000B8AE7
Firmware Osig: [PLDS DG-16D4S 0225]
Firmware is: SlimKey Extract
As you can see "Parse Failed" appeers after trying to flash from the first stock firmware pull.
Last edited: