Hi,
I have a few years of modding behind me, and 5 successful kamikaze hacks.
Now apparently I had another one, acquired the DVD key, marked it at the crossing of the three lines, kamikaze it with 0x00, flashed with LT+2.0, relocked it, did the outro 3 times, everything as usual.
BUT !!!
Now the Xbox won't read anything...
I tried again, unlocked it with some alcohol, rewrote it with original spoofed fw but nothing...
Maybe the kamikaze went wrong this time?
Everything works as it should, khm except for reading :facepalm:
Am I missing something, I ordered the replacement PCB but I am mad on my self because of the failure. I did everything as always?...:mad2:
Here is the jf log:
JungleFlasher 0.1.89 Beta (284)
Session Started Thu Nov 24 15:42:13 2011
This is a Wow 64 process running on 4 x 64 bit CPUs
X360USB PRO detected, Version 0.18
Found 1 I/O Ports.
Found 1 Com Ports.
Found 12 windows drives A: C: D: E: F: G: H: I: J: K: M: N:
Found 2 CD/DVD drives H: N:
Loading firmware file C:\Users\BrankoG\Desktop\Xbox\xbox temp\21\backup\Dummy.bin
MD5 hash: 808ac9fb10757e7a2d308a9991fdcbff
Inquiry string found
Identify string found
Drive key @ 0xA030 0C6810C3FF99D0FF4C1B6AB4F21E703D
Firmware Osig: [PLDS DG-16D4S 1071]
Firmware is: SlimKey Extract
Auto-Loading firmware file C:\Program Files (x86)\JungleFlasher v0.1.89 Beta (284)\firmware\LTPlus-1071-v2.0.bin
MD5 hash: 2811f396793a42c2f284c4ac8f9c4dbc
Genuine LT plus v2.0
Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
Firmware Osig: [PLDS DG-16D4S 1071]
Firmware is: LT-Plus 2.0
Spoofing Target
DVD Key copied to target
Key Sector copied from Source to Target
Target is LT - ID strings not copied to Target
Sending Vendor Intro to port 0x0000
Status 0x51
Re-sending Vendor Intro:
...
Serial flash found with Status 0x72
Sending Device ID request to port 0x0000
Spi Status: 0x8C
Manufacturer ID: 0xEF
Device ID: 0x11
Flash Name: Winbond/NEX(W25P20/NX25P20)
Flash Size: 262144 bytes
Sending Spi UnLock request to Port 0x0000
............................................................................................................................................................................................................................................................................................................................................................................................................
Spi Status: 0x00
Getting Status from port 0x0000
SPi flash found with Status 0x72
Sending Chip Erase to Port 0x0000
Erasing:
Writing target buffer to flash
Writing Bank 0: ................
Writing Bank 1: ................
Writing Bank 2: ................
Writing Bank 3: ................
............
Flash Verification Test !
Reading Bank 0: ................
Reading Bank 1: ................
Reading Bank 2: ................
Reading Bank 3: ................
Dumped in 4018mS
Write verified OK !
Restoring sector 0x3E000.
Sending Sector Erase to Port 0x0000
Erasing: 0x3E000
Writing: 0x3E000
............
Authorised !
................
Restore verified OK !
Drive is Lite-On..
Key found in KeyDB at record (18 - backup)
Key is: 0C6810C3FF99D0FF4C1B6AB4F21E703D
Key has been tested and verified, thanks C4eva !
Sending Vendor Outro to port 0x0000
Drive is Lite-On..
Key found in KeyDB at record (18 - backup)
Key is: 0C6810C3FF99D0FF4C1B6AB4F21E703D
Key has been tested and verified, thanks C4eva !
Sending Vendor Outro to port 0x0000
Drive is Lite-On..
Key found in KeyDB at record (18 - backup)
Key is: 0C6810C3FF99D0FF4C1B6AB4F21E703D
Key has been tested and verified, thanks C4eva !
Sending Vendor Outro to port 0x0000
Drive is Lite-On..
I have a few years of modding behind me, and 5 successful kamikaze hacks.
Now apparently I had another one, acquired the DVD key, marked it at the crossing of the three lines, kamikaze it with 0x00, flashed with LT+2.0, relocked it, did the outro 3 times, everything as usual.
BUT !!!
Now the Xbox won't read anything...
I tried again, unlocked it with some alcohol, rewrote it with original spoofed fw but nothing...
Maybe the kamikaze went wrong this time?
Everything works as it should, khm except for reading :facepalm:
Am I missing something, I ordered the replacement PCB but I am mad on my self because of the failure. I did everything as always?...:mad2:
Here is the jf log:
JungleFlasher 0.1.89 Beta (284)
Session Started Thu Nov 24 15:42:13 2011
This is a Wow 64 process running on 4 x 64 bit CPUs
X360USB PRO detected, Version 0.18
Found 1 I/O Ports.
Found 1 Com Ports.
Found 12 windows drives A: C: D: E: F: G: H: I: J: K: M: N:
Found 2 CD/DVD drives H: N:
Loading firmware file C:\Users\BrankoG\Desktop\Xbox\xbox temp\21\backup\Dummy.bin
MD5 hash: 808ac9fb10757e7a2d308a9991fdcbff
Inquiry string found
Identify string found
Drive key @ 0xA030 0C6810C3FF99D0FF4C1B6AB4F21E703D
Firmware Osig: [PLDS DG-16D4S 1071]
Firmware is: SlimKey Extract
Auto-Loading firmware file C:\Program Files (x86)\JungleFlasher v0.1.89 Beta (284)\firmware\LTPlus-1071-v2.0.bin
MD5 hash: 2811f396793a42c2f284c4ac8f9c4dbc
Genuine LT plus v2.0
Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
Firmware Osig: [PLDS DG-16D4S 1071]
Firmware is: LT-Plus 2.0
Spoofing Target
DVD Key copied to target
Key Sector copied from Source to Target
Target is LT - ID strings not copied to Target
Sending Vendor Intro to port 0x0000
Status 0x51
Re-sending Vendor Intro:
...
Serial flash found with Status 0x72
Sending Device ID request to port 0x0000
Spi Status: 0x8C
Manufacturer ID: 0xEF
Device ID: 0x11
Flash Name: Winbond/NEX(W25P20/NX25P20)
Flash Size: 262144 bytes
Sending Spi UnLock request to Port 0x0000
............................................................................................................................................................................................................................................................................................................................................................................................................
Spi Status: 0x00
Getting Status from port 0x0000
SPi flash found with Status 0x72
Sending Chip Erase to Port 0x0000
Erasing:
Writing target buffer to flash
Writing Bank 0: ................
Writing Bank 1: ................
Writing Bank 2: ................
Writing Bank 3: ................
............
Flash Verification Test !
Reading Bank 0: ................
Reading Bank 1: ................
Reading Bank 2: ................
Reading Bank 3: ................
Dumped in 4018mS
Write verified OK !
Restoring sector 0x3E000.
Sending Sector Erase to Port 0x0000
Erasing: 0x3E000
Writing: 0x3E000
............
Authorised !
................
Restore verified OK !
Drive is Lite-On..
Key found in KeyDB at record (18 - backup)
Key is: 0C6810C3FF99D0FF4C1B6AB4F21E703D
Key has been tested and verified, thanks C4eva !
Sending Vendor Outro to port 0x0000
Drive is Lite-On..
Key found in KeyDB at record (18 - backup)
Key is: 0C6810C3FF99D0FF4C1B6AB4F21E703D
Key has been tested and verified, thanks C4eva !
Sending Vendor Outro to port 0x0000
Drive is Lite-On..
Key found in KeyDB at record (18 - backup)
Key is: 0C6810C3FF99D0FF4C1B6AB4F21E703D
Key has been tested and verified, thanks C4eva !
Sending Vendor Outro to port 0x0000
Drive is Lite-On..