LITEON DG-16D4S - SLIM Weird outcome on Kamikaze hack - Cant lock SPI

GameCustomZ

Junior Member
Dec 24, 2012
11
0
Colorado
www.sparkgfx.net
So I just did a Gears of War slim, kamikaze hacked it. Kept getting Write Verified, stuck in Vendor Mode, and couldn't lock SPI. Looks like I did not go too deep in drilling. I use the Maximus Template. Put the drive into the Xbox and tried a back up of Battlefield 3...it worked, played like a charm. I hooked everything back up to the computer and tried to put back into vendor mode. Got the Write Verified Failed message again. But then I was able to lock the SPI status back to 0x8C. So is the box OK to play online or even play backups? Just a weird outcome and process I have ever gone through. I have done over hundreds of flashes, but this one has me stumped...

JungleFlash Log Below:

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

JungleFlasher 0.1.94 Beta (320)

Session Started Tue Apr 02 14:33:13 2013



This is a Wow 64 process running on 8 x 64 bit CPUs

X360USB PRO detected, Version 0.18



portio64.sys Driver Installed

portio64.sys Driver Started, thanks Schtrom !

Found 7 I/O Ports.

Found 2 Com Ports.

Found 8 windows drives C: D: E: F: G: H: I: J:

Found 3 CD/DVD drives D: E: I:



Drive is Slim Lite-On..

Drive is Slim Lite-On..





0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS

0010: 44 47 2D 31 36 44 34 53 - 20 20 20 20 20 20 20 20 DG-16D4S

0020: 31 30 37 31 00 00 00 00 - 00 00 00 00 00 00 00 00 1071............

0030: 00 00 00 00 41 30 42 30 - 00 00 00 00 00 00 00 00 ....A0B0........

0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0060: 44 37 31 37 42 42 31 32 - 32 36 30 39 30 30 45 5A D717BB12260900EZ

0070: 4D 20 20 20 M



0000: C0 85 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0010: 00 00 00 00 37 44 37 31 - 42 42 32 31 36 32 39 30 ....7D71BB216290

0020: 30 30 5A 45 20 4D 20 20 - 00 00 00 00 00 00 30 31 00ZE M ......01

0030: 31 37 20 20 20 20 4C 50 - 53 44 20 20 20 20 47 44 17 LPSD GD

0040: 31 2D 44 36 53 34 20 20 - 20 20 20 20 20 20 00 00 1-D6S4 ..

0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0060: 00 00 00 0F 00 40 00 04 - 00 02 06 00 00 00 00 00 [email protected]

0070: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0080: 03 00 78 00 78 00 78 00 - 78 00 00 00 00 00 00 00 ..x.x.x.x.......

0090: 00 00 F8 00 10 02 00 00 - 02 02 00 00 60 00 40 00 ............`[email protected]

00A0: F8 00 10 02 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

00B0: 3F 20 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ? ..............

00C0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

00D0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

00E0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

00F0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0100: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0110: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0120: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0130: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0140: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0150: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0160: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0170: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0180: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0190: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

01A0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

01B0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

01C0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

01D0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

01E0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

01F0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................



Sending Vendor Intro to port 0x0000



Serial flash found with Status 0x72



Sending Device ID request to port 0x0000

Manufacturer ID: 0xEF

Device ID: 0x11

Flash Name: Winbond/NEX(W25P20/NX25P20)

Flash Size: 262144 bytes

............

Key: 057A2160E17E47C7FC06A0AEBF1E8DD7 is verified, Thanks C4eva



Grabbing Key sector: ................

Key Sector verified.

Grabbing Serial info: ........



Drive is Slim Lite-On..

0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS

0010: 44 47 2D 31 36 44 34 53 - 20 20 20 20 20 20 20 20 DG-16D4S

0020: 31 30 37 31 00 00 00 00 - 00 00 00 00 00 00 00 00 1071............

0030: 00 00 00 00 41 30 42 30 - 00 00 00 00 00 00 00 00 ....A0B0........

0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0060: 44 37 31 37 42 42 31 32 - 32 36 30 39 30 30 45 5A D717BB12260900EZ

0070: 4D 20 20 20 M



0000: C0 85 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0010: 00 00 00 00 37 44 37 31 - 42 42 32 31 36 32 39 30 ....7D71BB216290

0020: 30 30 5A 45 20 4D 20 20 - 00 00 00 00 00 00 30 31 00ZE M ......01

0030: 31 37 20 20 20 20 4C 50 - 53 44 20 20 20 20 47 44 17 LPSD GD

0040: 31 2D 44 36 53 34 20 20 - 20 20 20 20 20 20 00 00 1-D6S4 ..

0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0060: 00 00 00 0F 00 40 00 04 - 00 02 06 00 00 00 00 00 [email protected]

0070: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0080: 03 00 78 00 78 00 78 00 - 78 00 00 00 00 00 00 00 ..x.x.x.x.......

0090: 00 00 F8 00 10 02 00 00 - 02 02 00 00 60 00 40 00 ............`[email protected]

00A0: F8 00 10 02 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

00B0: 3F 20 00 00 ? ..



0000: 44 37 31 37 42 42 31 32 - 32 36 30 39 30 30 45 5A D717BB12260900EZ

0010: 4D 20 20 20 FF FF FF FF - 31 45 32 32 30 33 36 37 M ....1E220367

0020: 31 36 42 39 35 58 58 52 - 41 30 FF FF 53 35 50 31 16B95XXRA0..S5P1

0030: 36 30 32 30 30 30 30 30 - 30 34 32 30 36 32 00 00 60200000042062..

0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 42 30 FF FF ............B0..



Hashing Drive: ................



Dummy.bin file saved to Dummy.bin

Loading firmware from buffer

Inquiry string found

Identify string found

Drive key @ 0xA030 057A2160E17E47C7FC06A0AEBF1E8DD7

Firmware Osig: [PLDS DG-16D4S 1071]

Firmware is: SlimKey Extract

Key added to database



Drive is Slim Lite-On..



Key found in KeyDB at record (5 - MARCEL BROWN)

Key is: 057A2160E17E47C7FC06A0AEBF1E8DD7

Key has been tested and verified, thanks C4eva !





0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS

0010: 44 47 2D 31 36 44 34 53 - 20 20 20 20 20 20 20 20 DG-16D4S

0020: 31 30 37 31 00 00 00 00 - 00 00 00 00 00 00 00 00 1071............

0030: 00 00 00 00 41 30 42 30 - 00 00 00 00 00 00 00 00 ....A0B0........

0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0060: 44 37 31 37 42 42 31 32 - 32 36 30 39 30 30 45 5A D717BB12260900EZ

0070: 4D 20 20 20 M



0000: C0 85 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0010: 00 00 00 00 37 44 37 31 - 42 42 32 31 36 32 39 30 ....7D71BB216290

0020: 30 30 5A 45 20 4D 20 20 - 00 00 00 00 00 00 30 31 00ZE M ......01

0030: 31 37 20 20 20 20 4C 50 - 53 44 20 20 20 20 47 44 17 LPSD GD

0040: 31 2D 44 36 53 34 20 20 - 20 20 20 20 20 20 00 00 1-D6S4 ..

0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0060: 00 00 00 0F 00 40 00 04 - 00 02 06 00 00 00 00 00 [email protected]

0070: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0080: 03 00 78 00 78 00 78 00 - 78 00 00 00 00 00 00 00 ..x.x.x.x.......

0090: 00 00 F8 00 10 02 00 00 - 02 02 00 00 60 00 40 00 ............`[email protected]

00A0: F8 00 10 02 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

00B0: 3F 20 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ? ..............

00C0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

00D0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

00E0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

00F0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0100: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0110: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0120: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0130: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0140: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0150: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0160: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0170: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0180: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0190: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

01A0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

01B0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

01C0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

01D0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

01E0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

01F0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................



Sending Vendor Intro to port 0x0000

Status 0x51

Re-sending Vendor Intro:

........

Serial flash found with Status 0x72



Sending Device ID request to port 0x0000

Manufacturer ID: 0xEF

Device ID: 0x11

Flash Name: Winbond/NEX(W25P20/NX25P20)

Flash Size: 262144 bytes

............

Key: 057A2160E17E47C7FC06A0AEBF1E8DD7 is verified, Thanks C4eva



Grabbing Key sector: ................

Key Sector verified.

Grabbing Serial info: ........



Drive is Slim Lite-On..



Key found in KeyDB at record (5 - MARCEL BROWN)

Key is: 057A2160E17E47C7FC06A0AEBF1E8DD7

Key has been tested and verified, thanks C4eva !

0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS

0010: 44 47 2D 31 36 44 34 53 - 20 20 20 20 20 20 20 20 DG-16D4S

0020: 31 30 37 31 00 00 00 00 - 00 00 00 00 00 00 00 00 1071............

0030: 00 00 00 00 41 30 42 30 - 00 00 00 00 00 00 00 00 ....A0B0........

0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0060: 44 37 31 37 42 42 31 32 - 32 36 30 39 30 30 45 5A D717BB12260900EZ

0070: 4D 20 20 20 M



0000: C0 85 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0010: 00 00 00 00 37 44 37 31 - 42 42 32 31 36 32 39 30 ....7D71BB216290

0020: 30 30 5A 45 20 4D 20 20 - 00 00 00 00 00 00 30 31 00ZE M ......01

0030: 31 37 20 20 20 20 4C 50 - 53 44 20 20 20 20 47 44 17 LPSD GD

0040: 31 2D 44 36 53 34 20 20 - 20 20 20 20 20 20 00 00 1-D6S4 ..

0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0060: 00 00 00 0F 00 40 00 04 - 00 02 06 00 00 00 00 00 [email protected]

0070: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0080: 03 00 78 00 78 00 78 00 - 78 00 00 00 00 00 00 00 ..x.x.x.x.......

0090: 00 00 F8 00 10 02 00 00 - 02 02 00 00 60 00 40 00 ............`[email protected]

00A0: F8 00 10 02 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

00B0: 3F 20 00 00 ? ..



0000: 44 37 31 37 42 42 31 32 - 32 36 30 39 30 30 45 5A D717BB12260900EZ

0010: 4D 20 20 20 FF FF FF FF - 31 45 32 32 30 33 36 37 M ....1E220367

0020: 31 36 42 39 35 58 58 52 - 41 30 FF FF 53 35 50 31 16B95XXRA0..S5P1

0030: 36 30 32 30 30 30 30 30 - 30 34 32 30 36 32 00 00 60200000042062..

0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 42 30 FF FF ............B0..



Hashing Drive: ................



Dummy.bin file saved to Dummy.bin

Loading firmware from buffer

Inquiry string found

Identify string found

Drive key @ 0xA030 057A2160E17E47C7FC06A0AEBF1E8DD7

Firmware Osig: [PLDS DG-16D4S 1071]

Firmware is: SlimKey Extract

Key database updated



Auto-Loading firmware file C:\Users\SPARKGFX\Desktop\XBOX Mods & Firmware\JungleFlasher v0.1.94 Beta (320)\firmware\LTPlus-1071-v3.0.bin

MD5 hash: 3d1243454d9c6c1cd2760b8ea5f5c648

Genuine LT plus v3.0

Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF

Firmware Osig: [PLDS DG-16D4S 1071]

Firmware is: LT-Plus 3.0

Spoofing Target

DVD Key copied to target

Key Sector copied from Source to Target

Target is LT - ID strings not copied to Target



Sending Vendor Intro to port 0x0000

Status 0x51

Re-sending Vendor Intro:

...........

Serial flash found with Status 0x72



Sending Device ID request to port 0x0000

Spi Status: 0x8C

Manufacturer ID: 0xEF

Device ID: 0x11

Flash Name: Winbond/NEX(W25P20/NX25P20)

Flash Size: 262144 bytes



Sending Spi UnLock request to Port 0x0000

............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

Spi Status: 0x00



Getting Status from port 0x0000

Serial flash found with Status 0x72

Reading Drive Key.

............

Authorised !

Grabbing sector 0x3E000.

................

Blank 3E000 sector detected!

Known f/w confirmed !

Sending Vendor Intro to port 0x0000

Status 0x51

Re-sending Vendor Intro:

.........

Serial flash found with Status 0x72



Sending Device ID request to port 0x0000

Manufacturer ID: 0xEF

Device ID: 0x11

Flash Name: Winbond/NEX(W25P20/NX25P20)

Flash Size: 262144 bytes



Updating flash for on-line dump.



Sending Sector Erase to Port 0x0000

Erasing: 0x3E000

Writing: 0x3E000

............

Reading Bank 0: ................

Reading Bank 1: ................

Reading Bank 2: ................

Reading Bank 3: ................

Dumped in 5180mS



Restoring sector 0x3E000.



Sending Sector Erase to Port 0x0000

Erasing: 0x3E000

Writing: 0x3E000

............

Authorised !

................

Restore 0x3E000 verified !



Lite-On Dump file saved to Lite-OFW.bin

Loading firmware from buffer

Drive key @ n/a 057A2160E17E47C7FC06A0AEBF1E8DD7

Firmware Osig: [PLDS DG-16D4S 1071]

Firmware is: Stock

Key database updated



Auto-Loading firmware file C:\Users\SPARKGFX\Desktop\XBOX Mods & Firmware\JungleFlasher v0.1.94 Beta (320)\firmware\LTPlus-1071-v3.0.bin

MD5 hash: 3d1243454d9c6c1cd2760b8ea5f5c648

Genuine LT plus v3.0

Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF

Firmware Osig: [PLDS DG-16D4S 1071]

Firmware is: LT-Plus 3.0

Spoofing Target

DVD Key copied to target

Key Sector copied from Source to Target

Target is LT - ID strings not copied to Target



Drive is Slim Lite-On..



Key found in KeyDB at record (5 - MARCEL BROWN)

Key is: 057A2160E17E47C7FC06A0AEBF1E8DD7

Key has been tested and verified, thanks C4eva !

Sending Vendor Intro to port 0x0000

Status 0x51

Re-sending Vendor Intro:

.........

Serial flash found with Status 0x72



Sending Device ID request to port 0x0000

Spi Status: 0x00

Manufacturer ID: 0xEF

Device ID: 0x11

Flash Name: Winbond/NEX(W25P20/NX25P20)

Flash Size: 262144 bytes



Getting Status from port 0x0000

SPi flash found with Status 0x72



Sending Chip Erase to Port 0x0000

Erasing:

Writing target buffer to flash

Writing Bank 0: ................

Writing Bank 1: ................

Writing Bank 2: ................

Writing Bank 3: ................

............

Flash Verification Test !

Reading Bank 0: ................

Reading Bank 1: ................

Reading Bank 2: ................

Reading Bank 3: ................

Dumped in 5191mS



Write Verify Failed !



Getting Status from port 0x0000

Invalid Status 0x50



Getting Status from port 0x0000

Invalid Status 0x50

Drive is Slim Lite-On..



Key found in KeyDB at record (5 - MARCEL BROWN)

Key is: 057A2160E17E47C7FC06A0AEBF1E8DD7

Key has been tested and verified, thanks C4eva !

Sending Vendor Intro to port 0x0000



Serial flash found with Status 0x72



Sending Device ID request to port 0x0000

Spi Status: 0x00

Manufacturer ID: 0xEF

Device ID: 0x11

Flash Name: Winbond/NEX(W25P20/NX25P20)

Flash Size: 262144 bytes



Getting Status from port 0x0000

SPi flash found with Status 0x72



Sending Chip Erase to Port 0x0000

Erasing:

Writing target buffer to flash

Writing Bank 0: ................

Writing Bank 1: ................

Writing Bank 2: ................

Writing Bank 3: ................

............

Flash Verification Test !

Reading Bank 0: ................

Reading Bank 1: ................

Reading Bank 2: ................

Reading Bank 3: ................

Dumped in 5211mS



Write Verify Failed !



Getting Status from port 0x0000

Invalid Status 0x50

Sending Vendor Outro to port 0x0000

Drive is Slim Lite-On..



Key found in KeyDB at record (5 - MARCEL BROWN)

Key is: 057A2160E17E47C7FC06A0AEBF1E8DD7

Key has been tested and verified, thanks C4eva !

Sending Vendor Intro to port 0x0000



Serial flash found with Status 0x72



Sending Device ID request to port 0x0000

Spi Status: 0x00

Manufacturer ID: 0xEF

Device ID: 0x11

Flash Name: Winbond/NEX(W25P20/NX25P20)

Flash Size: 262144 bytes



Getting Status from port 0x0000

Serial flash found with Status 0x72

Reading Drive Key.

............

Authorised !

Grabbing sector 0x3E000.

................

Modded sector detected !

Ready for on-line dump.



Reading Bank 0: ................

Reading Bank 1: ................

Reading Bank 2: ................

Reading Bank 3: ................

Dumped in 5201mS



Restoring sector 0x3E000.



Sending Sector Erase to Port 0x0000

Erasing: 0x3E000

Writing: 0x3E000

............

Authorised !

................

Restore 0x3E000 verified !



Lite-On Dump file saved to Lite-OFW.bin

Loading firmware from buffer

Drive key @ n/a 057A2160E17E47C7FC06A0AEBF1E8DD7

Firmware Osig: [PLDS DG-16D4S 1071]

Firmware is: LT-Plus 3.0

Key database updated



Auto-Loading firmware file C:\Users\SPARKGFX\Desktop\XBOX Mods & Firmware\JungleFlasher v0.1.94 Beta (320)\firmware\LTPlus-1071-v3.0.bin

MD5 hash: 3d1243454d9c6c1cd2760b8ea5f5c648

Genuine LT plus v3.0

Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF

Firmware Osig: [PLDS DG-16D4S 1071]

Firmware is: LT-Plus 3.0

Spoofing Target

DVD Key copied to target

Key Sector copied from Source to Target

Target is LT - ID strings not copied to Target



Drive is Slim Lite-On..



Key found in KeyDB at record (5 - MARCEL BROWN)

Key is: 057A2160E17E47C7FC06A0AEBF1E8DD7

Key has been tested and verified, thanks C4eva !

Sending Vendor Intro to port 0x0000

Status 0x51

Re-sending Vendor Intro:

.........

Serial flash found with Status 0x72



Sending Device ID request to port 0x0000

Spi Status: 0x00

Manufacturer ID: 0xEF

Device ID: 0x11

Flash Name: Winbond/NEX(W25P20/NX25P20)

Flash Size: 262144 bytes



Getting Status from port 0x0000

SPi flash found with Status 0x72



Sending Chip Erase to Port 0x0000

Erasing:

Writing target buffer to flash

Writing Bank 0: ................

Writing Bank 1: ................

Writing Bank 2: ................

Writing Bank 3: ................

............

Flash Verification Test !

Reading Bank 0: ................

Reading Bank 1: ................

Reading Bank 2: ................

Reading Bank 3: ................

Dumped in 5291mS



Write Verify Failed !



Getting Status from port 0x0000

Invalid Status 0x0

Sending Vendor Intro to port 0x0000



Serial flash found with Status 0x72



Sending Device ID request to port 0x0000

Spi Status: 0x00

Manufacturer ID: 0xEF

Device ID: 0x11

Flash Name: Winbond/NEX(W25P20/NX25P20)

Flash Size: 262144 bytes



Getting Status from port 0x0000

SPi flash found with Status 0x72



Sending Chip Erase to Port 0x0000

Erasing:

Writing target buffer to flash

Writing Bank 0: ................

Writing Bank 1: ................

Writing Bank 2: ................

Writing Bank 3: ................

............

Flash Verification Test !

Reading Bank 0: ................

Reading Bank 1: ................

Reading Bank 2: ................

Reading Bank 3: ................

Dumped in 5151mS



Write Verify Failed !



Getting Status from port 0x0000

Invalid Status 0x50



Getting Status from port 0x0000

Invalid Status 0x50



Getting Status from port 0x0000

Invalid Status 0x50

Sending Vendor Intro to port 0x0000



Serial flash found with Status 0x72



Sending Device ID request to port 0x0000

Spi Status: 0x00

Manufacturer ID: 0xEF

Device ID: 0x11

Flash Name: Winbond/NEX(W25P20/NX25P20)

Flash Size: 262144 bytes



Getting Status from port 0x0000

SPi flash found with Status 0x72



Sending Chip Erase to Port 0x0000

Erasing:

Writing target buffer to flash

Writing Bank 0: ................

Writing Bank 1: ................

Writing Bank 2: ................

Writing Bank 3: ................

............

Flash Verification Test !

Reading Bank 0: ................

Reading Bank 1: ................

Reading Bank 2: ................

Reading Bank 3: ................

Dumped in 5151mS



Write Verify Failed !



Sending Spi Lock request to Port 0x0000

Lock Failed !

Spi Status: 0x00

Sending Vendor Outro to port 0x0000

Drive is Slim Lite-On..



Key found in KeyDB at record (5 - MARCEL BROWN)

Key is: 057A2160E17E47C7FC06A0AEBF1E8DD7

Key has been tested and verified, thanks C4eva !
 

keil423

VIP Member
Apr 4, 2011
1,954
88
South Dakota, USA
www.epicconsole.com
Looks like you write Verify failed over and over. The Kamikazi hack is very easy to mess up. If you off just a hair sometimes thats all it takes. Looks to me like your Kamikazi hack failed. Your probably going to have to replace the PCB or find a failed Kamikazi repair kit.
 

MLG MODDER

BANNED
Feb 18, 2013
66
0
it will still play back up gamesif anything that happened to me before go to radioshack grab conductive glue.. put alittle dab into the hole use a paperclip to make sure it goes inside.. wait 10 mins try again.. it locked it for me!write verify failed dont worry about it.. 0x00 will be 0x08c or whatever you do it this way..I always use 91% alcohol.. and when im drilling i always dab it on the hole with a q-tip.. then drill a bit again and so on.. lol done 50 slims only failed once.. I use a secret tool ;)

- - - Updated - - -

conductive glue is in a tube the sh*t works!
 
  • Like
Reactions: keil423