JTAG Revive Updated Jtag.....

shortcake

Full Member
Nov 28, 2005
27
0
West Yorkshire, UK
Hi all, I've been given a Falcon Jtag which has been (foolishly) updated with an official update.

Its got no efuse protection which i find strange cos its been professionally jtagged but wotever.

When i turn it on i get black screen but no rlod - i've desoldered the jtag but still the same.

Is there any way i can make it into a working box ? i have the tools to dump the nand and i also have another (non jtagged) falcon i can read nand.

Any help please.... :)
 
How about you dump the NAND from this updated Falcon and see the CB and CD version of the NAND image? You'll probably see that the CB and CD has changed & the console is no longer Jtag exploitable now.

Plus, just knowing that there was no protection for efuses in place, I'd say that the console is not Jtaggable now.
 

shortcake

Full Member
Nov 28, 2005
27
0
West Yorkshire, UK
Thanks for quick reply.
I'm confident that its not jtaggable anymore i was just wondering if i can make it into a working (non jtagged) xbox ?
Maybe i can dump the nand off my working falcon, insert the KV and flash it to the non working box ?
 
Can be done. But the CB, CD etc of the image into which you'll inject the KV has to be the exact same one as the official update would have caused.
 

shortcake

Full Member
Nov 28, 2005
27
0
West Yorkshire, UK
Thanks for your help M AzeeM K, i sorted it - dumped the nand and the CB was still 5770 so i went ahead and created a freeboot image and voila - i got a working jtag falcon !! time to sell on my jtagged Xenon....... :)

Still find it strange how its still exploitable after installing an official m$ update though....
 

Martin C

VIP Member
Jan 10, 2004
35,981
0
Scotland, UK
www.team-xecuter.com
Thanks for your help M AzeeM K, i sorted it - dumped the nand and the CB was still 5770 so i went ahead and created a freeboot image and voila - i got a working jtag falcon !! time to sell on my jtagged Xenon....... :)

Still find it strange how its still exploitable after installing an official m$ update though....
So neither R6T3 was removed or the bridge was in place, yet the official MS update was applied?

Interesting....
 
I actually had a person call me telling me the exact same thing as the OP, and I replied him the same as I did above.

If what the OP says is correct, then....