i have just done a kamikaze hack on a customers drive. got correct chip properties all the way through and now its saying open tray. ive done this on 10 different consoles now but they were all 0225's this was 0401
where have i gone wrong???
here is a pic of the chip
here is jf log
where have i gone wrong???
here is a pic of the chip
here is jf log
![]()
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
JungleFlasher 0.1.87 Beta (277)
Session Started Thu Sep 22 17:42:57 2011
This is a 32 bit process running on 2 x 32 bit CPUs
X360USB PRO detected, Version 0.18
Found 1 I/O Ports.
Found 3 Com Ports.
Found 4 windows drives C: D: E: F:
Found 2 CD/DVD drives E: F:
Getting Status from port 0x0000
Invalid Status 0x50
Sending Vendor Intro to port 0x0000
Status 0x51
Re-sending Vendor Intro:
............................................................................................................................................................................................................................................................................................
Aborted by User!
Sending Vendor Intro to port 0x0000
Status 0x51
Re-sending Vendor Intro:
...............
Serial flash found with Status 0x72
Sending Device ID request to port 0x0000
Spi Status: 0x8C
Manufacturer ID: 0xEF
Device ID: 0x11
Flash Name: Winbond/NEX(W25P20/NX25P20)
Flash Size: 262144 bytes
Sending Spi UnLock request to Port 0x0000
............................................................................................................................................
Spi Status: 0x00
Getting Status from port 0x0000
Invalid Status 0x0
Getting Status from port 0x0000
Invalid Status 0x0
Sending Vendor Intro to port 0x0000
Serial flash found with Status 0x72
Sending Device ID request to port 0x0000
Spi Status: 0x00
Manufacturer ID: 0xEF
Device ID: 0x11
Flash Name: Winbond/NEX(W25P20/NX25P20)
Flash Size: 262144 bytes
Getting Status from port 0x0000
Serial flash found with Status 0x72
Reading Drive Key.
............
Authorised !
Grabbing sector 0x3E000.
................
Blank 3E000 sector detected!
Known f/w confirmed !
Sending Vendor Intro to port 0x0000
Status 0x51
Re-sending Vendor Intro:
................
Serial flash found with Status 0x72
Sending Device ID request to port 0x0000
Manufacturer ID: 0xEF
Device ID: 0x11
Flash Name: Winbond/NEX(W25P20/NX25P20)
Flash Size: 262144 bytes
Updating flash for on-line dump.
Sending Sector Erase to Port 0x0000
Erasing: 0x3E000
Writing: 0x3E000
............
Reading Bank 0: ................
Reading Bank 1: ................
Reading Bank 2: ................
Reading Bank 3: ................
Dumped in 4711mS
Restoring sector 0x3E000.
Sending Sector Erase to Port 0x0000
Erasing: 0x3E000
Writing: 0x3E000
............
Authorised !
................
Restore 0x3E000 verified !
Lite-On Dump file saved to Lite-OFW.bin
Loading firmware from buffer
Drive key @ n/a 9088B108FAB29163A11B8CA2E14D9AA4
Firmware Osig: [PLDS DG-16D4S 0401]
Firmware is: Stock
Key database updated
Auto-Loading firmware file C:\Users\LJ\Desktop\brett\JungleFlasher v0.1.85 Beta (257)\firmware\LTPlus-0401-v1.92.bin
MD5 hash: 3128442eae48cb5f9ffb0ce9778a3bd0
Genuine LT plus v1.92
Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
Firmware Osig: [PLDS DG-16D4S 0401]
Firmware is: LT-Plus 1.92
Spoofing Target
DVD Key copied to target
Key Sector copied from Source to Target
Target is LT - ID strings not copied to Target
Drive is Slim Lite-On..
Key found in KeyDB at record (4 - 1630477 11605)
Key is: 9088B108FAB29163A11B8CA2E14D9AA4
Key has been tested and verified, thanks C4eva !
Sending Vendor Intro to port 0x0000
Status 0x51
Re-sending Vendor Intro:
...............
Serial flash found with Status 0x72
Sending Device ID request to port 0x0000
Spi Status: 0x00
Manufacturer ID: 0xEF
Device ID: 0x11
Flash Name: Winbond/NEX(W25P20/NX25P20)
Flash Size: 262144 bytes
Getting Status from port 0x0000
SPi flash found with Status 0x72
Sending Chip Erase to Port 0x0000
Erasing:
Writing target buffer to flash
Writing Bank 0: ................
Writing Bank 1: ................
Writing Bank 2: ................
Writing Bank 3: ................
............
Flash Verification Test !
Reading Bank 0: ................
Reading Bank 1: ................
Reading Bank 2: ................
Reading Bank 3: ................
Dumped in 4686mS
Write verified OK !
Restoring sector 0x3E000.
Sending Sector Erase to Port 0x0000
Erasing: 0x3E000
Writing: 0x3E000
............
Authorised !
................
Restore verified OK !
Drive is Slim Lite-On..
Key found in KeyDB at record (4 - 1630477 11605)
Key is: 9088B108FAB29163A11B8CA2E14D9AA4
Key has been tested and verified, thanks C4eva !
Sending Vendor Intro to port 0x0000
Status 0x51
Re-sending Vendor Intro:
......................
Serial flash found with Status 0x72
Sending Device ID request to port 0x0000
Spi Status: 0x00
Manufacturer ID: 0xEF
Device ID: 0x11
Flash Name: Winbond/NEX(W25P20/NX25P20)
Flash Size: 262144 bytes
Spi Status: 0x8C
Sending Vendor Intro to port 0x0000
Serial flash found with Status 0x72
Sending Device ID request to port 0x0000
Spi Status: 0x8C
Manufacturer ID: 0xEF
Device ID: 0x11
Flash Name: Winbond/NEX(W25P20/NX25P20)
Flash Size: 262144 bytes