LITEON DG-16D4S - SLIM help please?

ataroreh8132

VIP Member
Apr 4, 2010
296
0
Virginia
hi everyone, i did the kamikaze hack on 0225 chip and everything went ok but when i load the game it say play dvd but the wierdd thing is that i put a verbatim copy of a games and it show play game, can someone tell me what happen? The key is correct and i reflashed 3 times!:(
 

hersheys247

VIP Member
Dec 25, 2011
1,128
88
Detroit area, MI, USA
Theres a bunch of people selling pcb unlocked and TX boards, open a new thread requesting item and someone will hook u up

Edit: long shot, but you can try this, clean the laser head, might be dirty, had the same issue where original would say play dvd, but verbatium would say play dvd, try that

Sent from my brain tumor causing device using Tapatalk
 
Last edited:

Ticallion

BANNED
Nov 30, 2011
799
0
Birmingham UK
hi everyone, i did the kamikaze hack on 0225 chip and everything went ok but when i load the game it say play dvd but the wierdd thing is that i put a verbatim copy of a games and it show play game, can someone tell me what happen? The key is correct and i reflashed 3 times!:(
Lets clarify - your JF log shows up as all ok, all verified correct?

You place an original in and you get play dvd, however if you place a verbatim backup in you get play game - but I'm guessing it kicks you back to the dashboard?

I would check and see if you might need to be using 0225u for a mislabeled 9504.
 

Astromine

VIP Member
Dec 27, 2005
416
0
Upstate New York
Please post your JF log, I am curious to see if this is a FW issue.

Thanks
 

hersheys247

VIP Member
Dec 25, 2011
1,128
88
Detroit area, MI, USA
Lets clarify - your JF log shows up as all ok, all verified correct?

You place an original in and you get play dvd, however if you place a verbatim backup in you get play game - but I'm guessing it kicks you back to the dashboard?

I would check and see if you might need to be using 0225u for a mislabeled 9504.
That may also be an issue, seen it happen and needed an 0225u instead


Sent from my brain tumor causing device using Tapatalk
 

ataroreh8132

VIP Member
Apr 4, 2010
296
0
Virginia
Please post your JF log, I am curious to see if this is a FW issue.

Thanks
JungleFlasher 0.1.92 Beta (304)

Session Started Sat Mar 31 14:54:51 2012



This is a 32 bit process running on 2 x 32 bit CPUs

X360USB PRO detected, Version 0.18



Found 1 I/O Ports.

Found 2 Com Ports.

Found 1 windows drives C:

Found 0 CD/DVD drives



Drive is Slim Lite-On..



Key found in KeyDB at record (428 - 9504)

Key is: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

Key has been tested and verified, thanks C4eva !





0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS

0010: 44 47 2D 31 36 44 34 53 - 20 20 20 20 20 20 20 20 DG-16D4S

0020: 30 32 32 35 00 00 00 00 - 00 00 00 00 00 00 00 00 0225............

0030: 00 00 00 00 41 30 41 30 - 00 00 00 00 00 00 00 00 ....A0A0........

0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0060: 44 37 31 31 43 47 30 31 - 36 38 31 31 30 30 38 59 D711CG016811008Y

0070: 51 20 20 20 Q



Sending Vendor Intro to port 0x0000

Status 0x51

Re-sending Vendor Intro:

..........

Serial flash found with Status 0x72



Sending Device ID request to port 0x0000

Manufacturer ID: 0xEF

Device ID: 0x11

Flash Name: Winbond/NEX(W25P20/NX25P20)

Flash Size: 262144 bytes

............

Key: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx is verified, Thanks C4eva



Grabbing Key sector: ................

Key Sector verified.

Grabbing Serial info: ........



Drive is Slim Lite-On..



Key found in KeyDB at record (428 - 9504)

Key is: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

Key has been tested and verified, thanks C4eva !

0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS

0010: 44 47 2D 31 36 44 34 53 - 20 20 20 20 20 20 20 20 DG-16D4S

0020: 30 32 32 35 00 00 00 00 - 00 00 00 00 00 00 00 00 0225............

0030: 00 00 00 00 41 30 41 30 - 00 00 00 00 00 00 00 00 ....A0A0........

0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0060: 44 37 31 31 43 47 30 31 - 36 38 31 31 30 30 38 59 D711CG016811008Y

0070: 51 20 20 20 Q



0000: C0 85 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0010: 00 00 00 00 37 44 31 31 - 47 43 31 30 38 36 31 31 ....7D11GC108611

0020: 30 30 59 38 00 51 00 00 - 00 00 00 00 00 00 32 30 00Y8.Q........20

0030: 35 32 20 20 20 20 4C 50 - 53 44 20 20 20 20 47 44 52 LPSD GD

0040: 31 2D 44 36 53 34 20 20 - 20 20 20 20 20 20 00 00 1-D6S4 ..

0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0060: 00 00 00 0F 00 40 00 04 - 00 02 06 00 00 00 00 00 [email protected]

0070: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0080: 03 00 78 00 78 00 78 00 - 78 00 00 00 00 00 00 00 ..x.x.x.x.......

0090: 00 00 F8 00 10 02 00 00 - 02 02 00 00 60 00 40 00 ............`[email protected]

00A0: F8 00 10 02 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

00B0: 3F 20 00 00 ? ..



0000: 44 37 31 31 43 47 30 31 - 36 38 31 31 30 30 38 59 D711CG016811008Y

0010: 51 20 20 20 FF FF FF FF - 30 44 31 38 32 30 35 31 Q ....0D182051

0020: 31 36 37 30 31 35 58 58 - 41 30 FF FF 53 34 50 30 167015XXA0..S4P0

0030: 34 31 37 30 30 30 30 30 - 32 33 31 31 34 33 00 00 41700000231143..

0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 41 30 FF FF ............A0..



Hashing Drive: ................



Dummy.bin file saved to Dummy.bin

Loading firmware from buffer

Inquiry string found

Identify string found

Drive key @ 0xA030
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

Firmware Osig: [PLDS DG-16D4S 0225]

Firmware is: SlimKey Extract

Key database updated



Auto-Loading firmware file C:\Users\ataroreh8132\Desktop\JungleFlasher v0.1.92 Beta (304)\firmware\LTPlus-0225-v3.0u.bin

MD5 hash: db5c70eaaabb53501c2c4f53dce9abfd

Genuine LT plus v3.0 (9504 upgrade)

Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF

Firmware Osig: [PLDS DG-16D4S 0225]

Firmware is: LT-Plus 3.0

Spoofing Target

DVD Key copied to target

Key Sector copied from Source to Target

Target is LT - ID strings not copied to Target



Spoofing Target

DVD Key already matches

Key Sector copied from Source to Target

Target is LT - ID strings not copied to Target





Target f/w saved as: Lite_CFW.bin

Sending Vendor Intro to port 0x0000

Status 0x51

Re-sending Vendor Intro:

..............

Serial flash found with Status 0x72



Sending Device ID request to port 0x0000

Spi Status: 0x8C

Manufacturer ID: 0xEF

Device ID: 0x11

Flash Name: Winbond/NEX(W25P20/NX25P20)

Flash Size: 262144 bytes



Sending Spi UnLock request to Port 0x0000

......................................................................................

Spi Status: 0x00



Getting Status from port 0x0000

SPi flash found with Status 0x72



Sending Chip Erase to Port 0x0000

Erasing:

Writing target buffer to flash

Writing Bank 0: ................

Writing Bank 1: ................

Writing Bank 2: ................

Writing Bank 3: ................

............

Flash Verification Test !

Reading Bank 0: ................

Reading Bank 1: ................

Reading Bank 2: ................

Reading Bank 3: ................

Dumped in 5585mS



Write verified OK !



Restoring sector 0x3E000.



Sending Sector Erase to Port 0x0000

Erasing: 0x3E000

Writing: 0x3E000

............

Authorised !

................

Restore verified OK !

Drive is Slim Lite-On..



Key found in KeyDB at record (428 - 0225)

Key is: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

Key has been tested and verified, thanks C4eva !

Sending Vendor Outro to port 0x0000

Drive is Slim Lite-On..

---------- Post added at 15:07 ---------- Previous post was at 15:05 ----------

That may also be an issue, seen it happen and needed an 0225u instead


Sent from my brain tumor causing device using Tapatalk
But wont JF auto load the correct FW for us?
 

hersheys247

VIP Member
Dec 25, 2011
1,128
88
Detroit area, MI, USA
First see if the drive is mislabeled or not. Also try JF 1.89 vs the latest and see if that works, remember to outro until u see drive again


Sent from my brain tumor causing device using Tapatalk
 

ataroreh8132

VIP Member
Apr 4, 2010
296
0
Virginia
Lets clarify - your JF log shows up as all ok, all verified correct?

You place an original in and you get play dvd, however if you place a verbatim backup in you get play game - but I'm guessing it kicks you back to the dashboard?

I would check and see if you might need to be using 0225u for a mislabeled 9504.
Yes, it kick back to dash

---------- Post added at 15:19 ---------- Previous post was at 15:14 ----------

First see if the drive is mislabeled or not. Also try JF 1.89 vs the latest and see if that works, remember to outro until u see drive again


Sent from my brain tumor causing device using Tapatalk
If i use JF 1.89 then i cannot use lt 3.0
 

x360ccm

BANNED
Jan 18, 2011
3,616
0
south coast UK
first thing do you have a drive labeled 9504 but shows up in jf as 0225.

LTPlus-0225-v3.0u.bin is for mislabeled drives aka 9504 show up as 0225

if it's not a mislabeled drive then load LTPlus-0225-v3.0 into target and dont forget to spoof source to target before you write to drive.
 
Last edited:
  • Like
Reactions: ataroreh8132

ataroreh8132

VIP Member
Apr 4, 2010
296
0
Virginia
first thing do you have a drive labled 9504 but shows up in jf as 0225.

LTPlus-0225-v3.0u.bin is for mislabled drives aka 9504

if it's not a mislabled drive then load LTPlus-0225-v3.0 into target and dont forget to spoof source to target before you write to drive.
No it is not mislabeled and u can see that i spoof source to target in my jf log eralier post
 

x360ccm

BANNED
Jan 18, 2011
3,616
0
south coast UK
load the LTPlus-0225-v3.0 then spoof source to target then write fw to drive.

if it aint mislabeled then.


try that

---------- Post added at 23:45 ---------- Previous post was at 23:41 ----------

JungleFlasher 0.1.92 Beta (304)

Session Started Sat Mar 31 14:54:51 2012



This is a 32 bit process running on 2 x 32 bit CPUs

X360USB PRO detected, Version 0.18



Found 1 I/O Ports.

Found 2 Com Ports.

Found 1 windows drives C:

Found 0 CD/DVD drives



Drive is Slim Lite-On..



Key found in KeyDB at record (428 - 9504)

Key is: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

Key has been tested and verified, thanks C4eva !





0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS

0010: 44 47 2D 31 36 44 34 53 - 20 20 20 20 20 20 20 20 DG-16D4S

0020: 30 32 32 35 00 00 00 00 - 00 00 00 00 00 00 00 00 0225............

0030: 00 00 00 00 41 30 41 30 - 00 00 00 00 00 00 00 00 ....A0A0........

0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0060: 44 37 31 31 43 47 30 31 - 36 38 31 31 30 30 38 59 D711CG016811008Y

0070: 51 20 20 20 Q



Sending Vendor Intro to port 0x0000

Status 0x51

Re-sending Vendor Intro:

..........

Serial flash found with Status 0x72



Sending Device ID request to port 0x0000

Manufacturer ID: 0xEF

Device ID: 0x11

Flash Name: Winbond/NEX(W25P20/NX25P20)

Flash Size: 262144 bytes

............

Key: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx is verified, Thanks C4eva



Grabbing Key sector: ................

Key Sector verified.

Grabbing Serial info: ........



Drive is Slim Lite-On..



Key found in KeyDB at record (428 - 9504)

Key is: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

Key has been tested and verified, thanks C4eva !

0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS

0010: 44 47 2D 31 36 44 34 53 - 20 20 20 20 20 20 20 20 DG-16D4S

0020: 30 32 32 35 00 00 00 00 - 00 00 00 00 00 00 00 00 0225............

0030: 00 00 00 00 41 30 41 30 - 00 00 00 00 00 00 00 00 ....A0A0........

0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0060: 44 37 31 31 43 47 30 31 - 36 38 31 31 30 30 38 59 D711CG016811008Y

0070: 51 20 20 20 Q



0000: C0 85 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0010: 00 00 00 00 37 44 31 31 - 47 43 31 30 38 36 31 31 ....7D11GC108611

0020: 30 30 59 38 00 51 00 00 - 00 00 00 00 00 00 32 30 00Y8.Q........20

0030: 35 32 20 20 20 20 4C 50 - 53 44 20 20 20 20 47 44 52 LPSD GD

0040: 31 2D 44 36 53 34 20 20 - 20 20 20 20 20 20 00 00 1-D6S4 ..

0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0060: 00 00 00 0F 00 40 00 04 - 00 02 06 00 00 00 00 00 [email protected]

0070: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0080: 03 00 78 00 78 00 78 00 - 78 00 00 00 00 00 00 00 ..x.x.x.x.......

0090: 00 00 F8 00 10 02 00 00 - 02 02 00 00 60 00 40 00 ............`[email protected]

00A0: F8 00 10 02 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

00B0: 3F 20 00 00 ? ..



0000: 44 37 31 31 43 47 30 31 - 36 38 31 31 30 30 38 59 D711CG016811008Y

0010: 51 20 20 20 FF FF FF FF - 30 44 31 38 32 30 35 31 Q ....0D182051

0020: 31 36 37 30 31 35 58 58 - 41 30 FF FF 53 34 50 30 167015XXA0..S4P0

0030: 34 31 37 30 30 30 30 30 - 32 33 31 31 34 33 00 00 41700000231143..

0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 41 30 FF FF ............A0..



Hashing Drive: ................



Dummy.bin file saved to Dummy.bin

Loading firmware from buffer

Inquiry string found

Identify string found

Drive key @ 0xA030
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

Firmware Osig: [PLDS DG-16D4S 0225]

Firmware is: SlimKey Extract

Key database updated



Auto-Loading firmware file C:\Users\ataroreh8132\Desktop\JungleFlasher v0.1.92 Beta (304)\firmware\LTPlus-0225-v3.0u.bin

MD5 hash: db5c70eaaabb53501c2c4f53dce9abfd

Genuine LT plus v3.0 (9504 upgrade)

Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF

Firmware Osig: [PLDS DG-16D4S 0225]

Firmware is: LT-Plus 3.0

Spoofing Target

DVD Key copied to target

Key Sector copied from Source to Target

Target is LT - ID strings not copied to Target



Spoofing Target

DVD Key already matches

Key Sector copied from Source to Target

Target is LT - ID strings not copied to Target





Target f/w saved as: Lite_CFW.bin

Sending Vendor Intro to port 0x0000

Status 0x51

Re-sending Vendor Intro:

..............

Serial flash found with Status 0x72



Sending Device ID request to port 0x0000

Spi Status: 0x8C

Manufacturer ID: 0xEF

Device ID: 0x11

Flash Name: Winbond/NEX(W25P20/NX25P20)

Flash Size: 262144 bytes



Sending Spi UnLock request to Port 0x0000

......................................................................................

Spi Status: 0x00



Getting Status from port 0x0000

SPi flash found with Status 0x72



Sending Chip Erase to Port 0x0000

Erasing:

Writing target buffer to flash

Writing Bank 0: ................

Writing Bank 1: ................

Writing Bank 2: ................

Writing Bank 3: ................

............

Flash Verification Test !

Reading Bank 0: ................

Reading Bank 1: ................

Reading Bank 2: ................

Reading Bank 3: ................

Dumped in 5585mS



Write verified OK !



Restoring sector 0x3E000.



Sending Sector Erase to Port 0x0000

Erasing: 0x3E000

Writing: 0x3E000

............

Authorised !

................

Restore verified OK !

Drive is Slim Lite-On..



Key found in KeyDB at record (428 - 0225)

Key is: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

Key has been tested and verified, thanks C4eva !

Sending Vendor Outro to port 0x0000

Drive is Slim Lite-On..

---------- Post added at 15:07 ---------- Previous post was at 15:05 ----------



But wont JF auto load the correct FW for us?
that many drives and you still dont understand what to try :rolleyes2:
 
  • Like
Reactions: ataroreh8132

Argentum

VIP Member
Dec 13, 2011
388
0
Khobar, Saudi Arabia
the log shows that LTPlus-0225-v3.0u.bin was auto loaded
try LTPlus-0225-v3.0.bin instead

is it labeled 0225 externally as well because this part of the log is confusing:
"Key found in KeyDB at record (428 - 9504)"

Anyway try 0272 as well if 0225 and 0225u don't work for you

If it all fails foe you I have a replacement pcb and
MT1339E with spi (pro unlock kit) pm me for info
 

Astromine

VIP Member
Dec 27, 2005
416
0
Upstate New York
Yeah it looks like a FW problem, if you drilled too far you would be having other issues. Let us know how everything turns out after you try flashing the drive with different firmware\key.
 
Last edited:

ataroreh8132

VIP Member
Apr 4, 2010
296
0
Virginia
Alright guys i finally put the puzzle together after scratching my head for almost 5 hours. The problem was i put the wrong key flash and my dumb ass didnt save the original ofw but luckily i save the jf log and found my key there. Is there a way i can make a CFW or OFW because i try to type in the correct key in manual spoof and it came up as Authorisation Failed!Restore Verify Failed !Please guys im sorry for all the trouble ive bring ya in?
 

Astromine

VIP Member
Dec 27, 2005
416
0
Upstate New York
The OFW you need should be in your JungleFlasher firmware folder along with your CFW.

Post the updated log.
 
Last edited:
  • Like
Reactions: ataroreh8132

hersheys247

VIP Member
Dec 25, 2011
1,128
88
Detroit area, MI, USA
You can either load ofw or custom firmware than manual spoof key and hit check. Than you can save file. And if your in vendor mode than just go about usual


Sent from my brain tumor causing device using Tapatalk
 
  • Like
Reactions: ataroreh8132