Martin C
VIP Member
Which key works?
7512C709005E8C99E9*********
or
E638AE392AA2EE1E8D*********
Right everytime I flash Lite-OFW.bin I get the authorisation failed. The only time I didn't was when I was flashing the ones I created using the FW pack.But Lite-OFW works only with auth failed, yes?
Load the dummy.bin into your source and flash LT+ based on that. Post the log.
Going to go pop the drive in the console real quick to see if anything might have changed....~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
JungleFlasher 0.1.91 Beta (300)
Session Started Fri Jan 01 22:07:31 2010
This is a Wow 64 process running on 2 x 64 bit CPUs
X360USB PRO detected, Version 0.18
Found 1 I/O Ports.
Found 1 Com Ports.
Found 5 windows drives A: C: D: E: G:
Found 2 CD/DVD drives D: E:
Loading firmware file C:\Xbox Mods\Firmware\Backups\********\Dummy.bin
MD5 hash: deb3d19c6aaa5ceaac4ef46283a0ea6d
Inquiry string found
Identify string found
Drive key @ 0xA030 7512C709005E8C99E9**********
Firmware Osig: [PLDS DG-16D4S 0225]
Firmware is: SlimKey Extract
Auto-Loading firmware file C:\Xbox Mods\Firmware\Tools\JungleFlasher\firmware\LTPlus-0225-v2.0.bin
MD5 hash: 1012021472620cad9adf1f838497668e
Genuine LT plus v2.0
Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
Firmware Osig: [PLDS DG-16D4S 0225]
Firmware is: LT-Plus 2.0
Spoofing Target
DVD Key copied to target
Key Sector copied from Source to Target
Target is LT - ID strings not copied to Target
Sending Vendor Intro to port 0x0000
Status 0x51
Re-sending Vendor Intro:
.
Serial flash found with Status 0x72
Sending Device ID request to port 0x0000
Spi Status: 0x00
Manufacturer ID: 0xEF
Device ID: 0x11
Flash Name: Winbond/NEX(W25P20/NX25P20)
Flash Size: 262144 bytes
Getting Status from port 0x0000
SPi flash found with Status 0x72
Sending Chip Erase to Port 0x0000
Erasing:
Writing target buffer to flash
Writing Bank 0: ................
Writing Bank 1: ................
Writing Bank 2: ................
Writing Bank 3: ................
............
Flash Verification Test !
Reading Bank 0: ................
Reading Bank 1: ................
Reading Bank 2: ................
Reading Bank 3: ................
Dumped in 12119mS
Write verified OK !
Restoring sector 0x3E000.
Sending Sector Erase to Port 0x0000
Erasing: 0x3E000
Writing: 0x3E000
............
Authorised !
................
Restore verified OK !
Drive is Slim Lite-On..
Key found in KeyDB at record (1 - **********)
Key is: 7512C709005E8C99E**************
Key has been tested and verified, thanks C4eva !
ok - that looks better.
Ok will do now.Yeah - you basically had a bad read of the OFW. Either to do with the Kamikaze or just one of those things. Your OFW was corrupt, which is why it failed auth and the data was throwing out the key.
Try this now - re-dump an OFW based on this working drive and try again with the NEW OFW.
Ok so here's what I just did:Yeah - you basically had a bad read of the OFW. Either to do with the Kamikaze or just one of those things. Your OFW was corrupt, which is why it failed auth and the data was throwing out the key.
Try this now - re-dump an OFW based on this working drive and try again with the NEW OFW.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
JungleFlasher 0.1.91 Beta (300)
Session Started Sun Jan 08 07:57:29 2012
This is a Wow 64 process running on 2 x 64 bit CPUs
X360USB PRO detected, Version 0.18
Found 1 I/O Ports.
Found 1 Com Ports.
Found 5 windows drives A: C: D: E: G:
Found 2 CD/DVD drives D: E:
Sending Vendor Intro to port 0x0000
Status 0x90
Re-sending Vendor Intro:
............
Serial flash found with Status 0x72
Sending Device ID request to port 0x0000
Spi Status: 0x00
Manufacturer ID: 0xEF
Device ID: 0x11
Flash Name: Winbond/NEX(W25P20/NX25P20)
Flash Size: 262144 bytes
Getting Status from port 0x0000
Serial flash found with Status 0x72
Reading Drive Key.
............
Authorised !
Grabbing sector 0x3E000.
................
Blank 3E000 sector detected!
Known f/w confirmed !
Sending Vendor Intro to port 0x0000
Status 0x51
Re-sending Vendor Intro:
.................
Serial flash found with Status 0x72
Sending Device ID request to port 0x0000
Manufacturer ID: 0xEF
Device ID: 0x11
Flash Name: Winbond/NEX(W25P20/NX25P20)
Flash Size: 262144 bytes
Updating flash for on-line dump.
Sending Sector Erase to Port 0x0000
Erasing: 0x3E000
Writing: 0x3E000
............
Reading Bank 0: ................
Reading Bank 1: ................
Reading Bank 2: ................
Reading Bank 3: ................
Dumped in 11936mS
Restoring sector 0x3E000.
Sending Sector Erase to Port 0x0000
Erasing: 0x3E000
Writing: 0x3E000
............
Authorised !
................
Restore 0x3E000 verified !
Lite-On Dump file saved to Lite-CFW.bin
Loading firmware from buffer
Drive key @ n/a 7512C709005E8C99E9*********
Firmware Osig: [PLDS DG-16D4S 0225]
Firmware is: LT-Plus 2.0
Key database updated
Drive is Slim Lite-On..
Key found in KeyDB at record (1 - *****)
Key is: 7512C709005E8C99E9C9*********
Key has been tested and verified, thanks C4eva !
Loading firmware file C:\Xbox Mods\Firmware\Tools\JungleFlasher\firmware\Orig-0225.bin
MD5 hash: 450a16f4672662eb47b540323bc778a7
Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
Firmware Osig: [PLDS DG-16D4S 0225]
Firmware is: Stock
Spoofing Target
DVD Key copied to target
Key Sector copied from Source to Target
Target is LT - ID strings not copied to Target
Sending Vendor Intro to port 0x0000
Status 0x51
Re-sending Vendor Intro:
.....................................
Serial flash found with Status 0x72
Sending Device ID request to port 0x0000
Spi Status: 0x00
Manufacturer ID: 0xEF
Device ID: 0x11
Flash Name: Winbond/NEX(W25P20/NX25P20)
Flash Size: 262144 bytes
Getting Status from port 0x0000
SPi flash found with Status 0x72
Sending Chip Erase to Port 0x0000
Erasing:
Writing target buffer to flash
Writing Bank 0: ................
Writing Bank 1: ................
Writing Bank 2: ................
Writing Bank 3: ................
............
Flash Verification Test !
Reading Bank 0: ................
Reading Bank 1: ................
Reading Bank 2: ................
Reading Bank 3: ................
Dumped in 11903mS
Write verified OK !
Restoring sector 0x3E000.
Sending Sector Erase to Port 0x0000
Erasing: 0x3E000
Writing: 0x3E000
............
Authorised !
................
Restore verified OK !
Drive is Slim Lite-On..
Key found in KeyDB at record (1 - ****)
Key is: 7512C709005E8C99E9C94*********
Key has been tested and verified, thanks C4eva !
Sending Vendor Outro to port 0x0000
Drive is Slim Lite-On..
Did just that and it was also a no go. Here's the log:ok - one more to try:
load your good dummy.bin, then manually load the stock 0225 as above and spoof source to target.
Write to the drive and test. Let me know what happens.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
JungleFlasher 0.1.91 Beta (300)
Session Started Sun Jan 08 08:14:52 2012
This is a Wow 64 process running on 2 x 64 bit CPUs
X360USB PRO detected, Version 0.18
Found 1 I/O Ports.
Found 1 Com Ports.
Found 5 windows drives A: C: D: E: G:
Found 2 CD/DVD drives D: E:
Loading firmware file C:\Xbox Mods\Firmware\Backups\*********\Dummy.bin
MD5 hash: deb3d19c6aaa5ceaac4ef46283a0ea6d
Inquiry string found
Identify string found
Drive key @ 0xA030 7512C709005E8C99***********
Firmware Osig: [PLDS DG-16D4S 0225]
Firmware is: SlimKey Extract
Loading firmware file C:\Xbox Mods\Firmware\Tools\JungleFlasher\firmware\Orig-0225.bin
MD5 hash: 450a16f4672662eb47b540323bc778a7
Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
Firmware Osig: [PLDS DG-16D4S 0225]
Firmware is: Stock
Spoofing Target
DVD Key copied to target
Key Sector copied from Source to Target
Target is LT - ID strings not copied to Target
Sending Vendor Intro to port 0x0000
Status 0x51
Re-sending Vendor Intro:
.
Serial flash found with Status 0x72
Sending Device ID request to port 0x0000
Spi Status: 0x00
Manufacturer ID: 0xEF
Device ID: 0x11
Flash Name: Winbond/NEX(W25P20/NX25P20)
Flash Size: 262144 bytes
Getting Status from port 0x0000
SPi flash found with Status 0x72
Sending Chip Erase to Port 0x0000
Erasing:
Writing target buffer to flash
Writing Bank 0: ................
Writing Bank 1: ................
Writing Bank 2: ................
Writing Bank 3: ................
............
Flash Verification Test !
Reading Bank 0: ................
Reading Bank 1: ................
Reading Bank 2: ................
Reading Bank 3: ................
Dumped in 11953mS
Write verified OK !
Restoring sector 0x3E000.
Sending Sector Erase to Port 0x0000
Erasing: 0x3E000
Writing: 0x3E000
............
Authorised !
................
Restore verified OK !
Drive is Slim Lite-On..
Key found in KeyDB at record (1 - ***********)
Key is: 7512C709005E8C99E9C*********
Key has been tested and verified, thanks C4eva !
Sending Vendor Outro to port 0x0000
Drive is Slim Lite-On..
If it doesn't I did save a full read of the working LT on my PC so hopefully either one will work. Going to check now.ok - was expecting that to work.
Just confirm that dummy.bin as source and autoload LT still works!
OMG what is it with this drive that's making it such a pain.ok - was expecting that to work.
Just confirm that dummy.bin as source and autoload LT still works!
Alright, I'm just gonna wait on 3.0 and then mess with it to get it working again. Still doesn't make sense though, because every time I flash the Lite-Orig.bin it works with the exception of the failed authorisation. If I was getting the occasional bad writes, wouldn't it affect that as well.It could be the work you did to unlock it. You're getting bad writes to the drive.
Keep using dummy.bin as the source as it's the data you took before cutting into the chip.
Failing that, replace the chip or PCB.
I have a 0225 drive with a replacement pcb in it. I will try later today to flash it with the dummy as source and pop it into the other console and see how it goes.As I said, load dummy.bin - let JF load the firmware.
(we know this works)
Write to your drive and test. If it doesn't, leave everything as is in JF and intro/write again.
Keep doing it until it works.
Once it works, leave it as is.
EDIT: I still reckon this is down to you cutting something in the chip. A replacement PCB/Drive would prove it.