Hello 
I've tried to unlock my lite-on
and mistakly i flashed stock frimware with JF and then i tried to connect the drive back to pc and its seems Dead i use the xbox power
P.S:i use an home made probe : [ame="http://www.youtube.com/watch?v=O-3Zwirxg2c"]How to flash mod Xbox 360 Liteon drive to Lt 3.0 without ck3 pro probe - YouTube[/ame]
P.S2: i Have dummy.bin
P.S3: WHEN I TRY TO VENDOR MOD ITS SEND ME 0x00 status and 0x2 and 0x5/6
here is the JF LOG:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
JungleFlasher 0.1.92 Beta (304)
Session Started Wed Jun 27 18:12:00 2012
This is a 32 bit process running on 4 x 32 bit CPUs
portio32.sys Driver Installed
portio32.sys Driver Started, thanks Schtrom !
Found 4 I/O Ports.
Found 1 Com Ports.
Found 3 windows drives A: C: G:
Found 0 CD/DVD drives
No Drive Detected! LO83info extraction aborted!
Drive is Lite-On..
Drive is Lite-On..
Sending Vendor Intro to port 0x0170
Status 0x51
Re-sending Vendor Intro:
.........
Serial flash found with Status 0x52
Extracted drive key failed Verification !
PhatKey extraction failed!
Drive is Lite-On..
Sending Vendor Intro to port 0x0170
Status 0x51
Re-sending Vendor Intro:
.............
Serial flash found with Status 0x52
Stage 1 failed
Extracted drive key failed Verification !
PhatKey extraction failed!
Drive is Lite-On..
Sending Vendor Intro to port 0x0170
Status 0x7F
Re-sending Vendor Intro:
........................................
Device Intro failed!
PhatKey extraction failed!
No Drive Detected! DVDkey files extraction aborted!
Drive is Lite-On..
Drive is Lite-On..
Sending Vendor Intro to port 0x0170
Status 0x51
Re-sending Vendor Intro:
.............................
Serial flash found with Status 0x52
Extracted drive key passed Verification !
key returned: Hidden
Key data saved to C:\Users\itzik\Desktop\Key.bin
0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS
0010: 44 47 2D 31 36 44 32 53 - 20 20 20 20 20 20 20 20 DG-16D2S
0020: 30 32 35 31 30 43 41 30 - 41 30 44 36 30 38 43 47 02510CA0A0D608CG
0030: 37 33 38 38 30 38 30 30 - 33 34 38 20 20 20 00 00 73880800348 ..
0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
Inquiry String saved to C:\Users\itzik\Desktop\Inquiry.bin
0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS
0010: 44 47 2D 31 36 44 32 53 - 20 20 20 20 20 20 20 20 DG-16D2S
0020: 30 32 35 31 30 43 20 20 - 00 00 00 00 00 00 00 00 02510C ........
0030: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000: C0 85 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0010: 00 00 00 00 44 36 30 38 - 43 47 37 33 38 38 30 38 ....D608CG738808
0020: 30 30 33 34 38 20 20 20 - 00 00 00 00 00 00 32 30 00348 ......20
0030: 31 35 43 30 20 20 4C 50 - 53 44 20 20 20 20 47 44 15C0 LPSD GD
0040: 31 2D 44 36 53 32 20 20 - 20 20 20 20 20 20 20 20 1-D6S2
0050: 20 20 20 20 20 20 20 20 - 20 20 20 20 20 20 00 00 ..
0060: 00 00 00 0B 00 00 00 04 - 00 02 06 00 00 00 00 00 ................
0070: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0080: 03 00 78 00 78 00 E3 00 - 78 00 00 00 00 00 00 00 ..x.x...x.......
0090: 00 00 00 00 00 00 00 00 - 02 02 00 00 68 00 00 00 ............h...
00A0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00B0: 20 20 00 00 ..
Identify String saved to C:\Users\itzik\Desktop\Identify.bin
0000: 44 36 30 38 43 47 37 33 - 38 38 30 38 30 30 33 34 D608CG7388080034
0010: 38 20 20 20 FF FF FF FF - FF FF FF FF FF FF FF FF 8 ............
0020: FF FF FF FF FF FF FF FF - 41 30 FF FF FF FF FF FF ........A0......
0030: FF FF FF FF FF FF FF FF - FF FF FF FF FF FF FF FF ................
0040: FF FF FF FF FF FF FF FF - FF FF FF FF 41 30 FF FF ............A0..
Serial String saved to C:\Users\itzik\Desktop\Serial.bin
Dummy.bin file saved to Dummy.bin
Loading firmware from buffer
Inquiry string found
Identify string found
Drive key @ 0xA030
Hidden
Firmware Osig: [PLDS DG-16D2S 0251]
Firmware is: PhatKey Extract
Key added to database
Loading firmware file C:\Users\itzik\Desktop\OFW\Dummy.bin
MD5 hash: 8042cfc833554474e1297c8b509fed98
Inquiry string found
Identify string found
Drive key @ 0xA030 Hidden
Firmware Osig: [PLDS DG-16D2S 0251]
Firmware is: PhatKey Extract
Loading firmware file C:\Users\itzik\Desktop\LT 3\Frimware\Stock firmware\LiteOn (Phat)\LiteOn_Post_13141\orig-02510C-1c000.bin
MD5 hash: e7e0f802769fd80329784ca4b512f1a9
Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
Firmware Osig: [PLDS DG-16D2S 0251]
Firmware is: Stock
Spoofing Target
DVD Key copied to target
Target is LT - ID strings not copied to Target
Serial data already matches
Target rev is LT 02510C, serial info not copied
Target f/w saved as: Lite_CFW.bin
Sending Lite-On-Erase request to port 0x0170
..............
Drive returned Status 0x0
.....
Serial flash found with Status 0x72
Manufacturer ID: 0xC2
Device ID: 0x11
Flash Name: MXIC(MX25L2005)
Flash Size: 262144 bytes
Getting Status from port 0x0170
SPi flash found with Status 0x72
Sending Chip Erase to Port 0x0170
Erasing:
Writing target buffer to flash
Writing Bank 0: ................
Writing Bank 1: ................
Writing Bank 2: ................
Writing Bank 3: ................
Flash Verification Test !
Reading Bank 0: ................
Reading Bank 1: ................
Reading Bank 2: ................
Reading Bank 3: ................
Write verified OK !
Sending Vendor Outro to port 0x0170
Drive is Lite-On..
Key found in KeyDB at record (1 - Desktop)
Key is: hidden
Key has been tested and verified, thanks C4eva !
Drive is Lite-On..
Key found in KeyDB at record (1 - Desktop)
Key is: Hidden
Key has been tested and verified, thanks C4eva !
Sending Vendor Intro to port 0x0170
Status 0x51
Re-sending Vendor Intro:
....................................................................................................................................................................................................
I've tried to unlock my lite-on
and mistakly i flashed stock frimware with JF and then i tried to connect the drive back to pc and its seems Dead i use the xbox power
P.S:i use an home made probe : [ame="http://www.youtube.com/watch?v=O-3Zwirxg2c"]How to flash mod Xbox 360 Liteon drive to Lt 3.0 without ck3 pro probe - YouTube[/ame]
P.S2: i Have dummy.bin
P.S3: WHEN I TRY TO VENDOR MOD ITS SEND ME 0x00 status and 0x2 and 0x5/6
here is the JF LOG:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
JungleFlasher 0.1.92 Beta (304)
Session Started Wed Jun 27 18:12:00 2012
This is a 32 bit process running on 4 x 32 bit CPUs
portio32.sys Driver Installed
portio32.sys Driver Started, thanks Schtrom !
Found 4 I/O Ports.
Found 1 Com Ports.
Found 3 windows drives A: C: G:
Found 0 CD/DVD drives
No Drive Detected! LO83info extraction aborted!
Drive is Lite-On..
Drive is Lite-On..
Sending Vendor Intro to port 0x0170
Status 0x51
Re-sending Vendor Intro:
.........
Serial flash found with Status 0x52
Extracted drive key failed Verification !
PhatKey extraction failed!
Drive is Lite-On..
Sending Vendor Intro to port 0x0170
Status 0x51
Re-sending Vendor Intro:
.............
Serial flash found with Status 0x52
Stage 1 failed
Extracted drive key failed Verification !
PhatKey extraction failed!
Drive is Lite-On..
Sending Vendor Intro to port 0x0170
Status 0x7F
Re-sending Vendor Intro:
........................................
Device Intro failed!
PhatKey extraction failed!
No Drive Detected! DVDkey files extraction aborted!
Drive is Lite-On..
Drive is Lite-On..
Sending Vendor Intro to port 0x0170
Status 0x51
Re-sending Vendor Intro:
.............................
Serial flash found with Status 0x52
Extracted drive key passed Verification !
key returned: Hidden
Key data saved to C:\Users\itzik\Desktop\Key.bin
0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS
0010: 44 47 2D 31 36 44 32 53 - 20 20 20 20 20 20 20 20 DG-16D2S
0020: 30 32 35 31 30 43 41 30 - 41 30 44 36 30 38 43 47 02510CA0A0D608CG
0030: 37 33 38 38 30 38 30 30 - 33 34 38 20 20 20 00 00 73880800348 ..
0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
Inquiry String saved to C:\Users\itzik\Desktop\Inquiry.bin
0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS
0010: 44 47 2D 31 36 44 32 53 - 20 20 20 20 20 20 20 20 DG-16D2S
0020: 30 32 35 31 30 43 20 20 - 00 00 00 00 00 00 00 00 02510C ........
0030: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000: C0 85 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0010: 00 00 00 00 44 36 30 38 - 43 47 37 33 38 38 30 38 ....D608CG738808
0020: 30 30 33 34 38 20 20 20 - 00 00 00 00 00 00 32 30 00348 ......20
0030: 31 35 43 30 20 20 4C 50 - 53 44 20 20 20 20 47 44 15C0 LPSD GD
0040: 31 2D 44 36 53 32 20 20 - 20 20 20 20 20 20 20 20 1-D6S2
0050: 20 20 20 20 20 20 20 20 - 20 20 20 20 20 20 00 00 ..
0060: 00 00 00 0B 00 00 00 04 - 00 02 06 00 00 00 00 00 ................
0070: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0080: 03 00 78 00 78 00 E3 00 - 78 00 00 00 00 00 00 00 ..x.x...x.......
0090: 00 00 00 00 00 00 00 00 - 02 02 00 00 68 00 00 00 ............h...
00A0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00B0: 20 20 00 00 ..
Identify String saved to C:\Users\itzik\Desktop\Identify.bin
0000: 44 36 30 38 43 47 37 33 - 38 38 30 38 30 30 33 34 D608CG7388080034
0010: 38 20 20 20 FF FF FF FF - FF FF FF FF FF FF FF FF 8 ............
0020: FF FF FF FF FF FF FF FF - 41 30 FF FF FF FF FF FF ........A0......
0030: FF FF FF FF FF FF FF FF - FF FF FF FF FF FF FF FF ................
0040: FF FF FF FF FF FF FF FF - FF FF FF FF 41 30 FF FF ............A0..
Serial String saved to C:\Users\itzik\Desktop\Serial.bin
Dummy.bin file saved to Dummy.bin
Loading firmware from buffer
Inquiry string found
Identify string found
Drive key @ 0xA030
Hidden
Firmware Osig: [PLDS DG-16D2S 0251]
Firmware is: PhatKey Extract
Key added to database
Loading firmware file C:\Users\itzik\Desktop\OFW\Dummy.bin
MD5 hash: 8042cfc833554474e1297c8b509fed98
Inquiry string found
Identify string found
Drive key @ 0xA030 Hidden
Firmware Osig: [PLDS DG-16D2S 0251]
Firmware is: PhatKey Extract
Loading firmware file C:\Users\itzik\Desktop\LT 3\Frimware\Stock firmware\LiteOn (Phat)\LiteOn_Post_13141\orig-02510C-1c000.bin
MD5 hash: e7e0f802769fd80329784ca4b512f1a9
Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
Firmware Osig: [PLDS DG-16D2S 0251]
Firmware is: Stock
Spoofing Target
DVD Key copied to target
Target is LT - ID strings not copied to Target
Serial data already matches
Target rev is LT 02510C, serial info not copied
Target f/w saved as: Lite_CFW.bin
Sending Lite-On-Erase request to port 0x0170
..............
Drive returned Status 0x0
.....
Serial flash found with Status 0x72
Manufacturer ID: 0xC2
Device ID: 0x11
Flash Name: MXIC(MX25L2005)
Flash Size: 262144 bytes
Getting Status from port 0x0170
SPi flash found with Status 0x72
Sending Chip Erase to Port 0x0170
Erasing:
Writing target buffer to flash
Writing Bank 0: ................
Writing Bank 1: ................
Writing Bank 2: ................
Writing Bank 3: ................
Flash Verification Test !
Reading Bank 0: ................
Reading Bank 1: ................
Reading Bank 2: ................
Reading Bank 3: ................
Write verified OK !
Sending Vendor Outro to port 0x0170
Drive is Lite-On..
Key found in KeyDB at record (1 - Desktop)
Key is: hidden
Key has been tested and verified, thanks C4eva !
Drive is Lite-On..
Key found in KeyDB at record (1 - Desktop)
Key is: Hidden
Key has been tested and verified, thanks C4eva !
Sending Vendor Intro to port 0x0170
Status 0x51
Re-sending Vendor Intro:
....................................................................................................................................................................................................
Last edited: