LITEON DG-16D4S - SLIM Write verify fail, help?

ataroreh8132

VIP Member
Apr 4, 2010
296
0
Virginia
JF Log


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

JungleFlasher 0.1.92 Beta (304)

Session Started Thu Mar 29 16:10:00 2012



This is a 32 bit process running on 2 x 32 bit CPUs

X360USB PRO detected, Version 0.18



Found 1 I/O Ports.

Found 2 Com Ports.

Found 1 windows drives C:

Found 0 CD/DVD drives



Drive is Slim Lite-On..



Key found in KeyDB at record (369 - halo reach)

Key is: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

Key has been tested and verified, thanks C4eva !





0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS

0010: 44 47 2D 31 36 44 34 53 - 20 20 20 20 20 20 20 20 DG-16D4S

0020: 30 32 37 32 00 00 00 00 - 00 00 00 00 00 00 00 00 0272............

0030: 00 00 00 00 41 30 41 30 - 00 00 00 00 00 00 00 00 ....A0A0........

0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0060: 44 37 31 31 43 47 30 32 - 30 39 31 35 30 30 33 34 D711CG0209150034

0070: 55 20 20 20 U



Sending Vendor Intro to port 0x0000

Status 0x51

Re-sending Vendor Intro:

........

Serial flash found with Status 0x72



Sending Device ID request to port 0x0000

Manufacturer ID: 0xEF

Device ID: 0x11

Flash Name: Winbond/NEX(W25P20/NX25P20)

Flash Size: 262144 bytes

............

Key: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
is verified, Thanks C4eva



Grabbing Key sector: ................

Key Sector verified.

Grabbing Serial info: ........



Drive is Slim Lite-On..



Key found in KeyDB at record (369 - halo reach)

Key is: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

Key has been tested and verified, thanks C4eva !

0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS

0010: 44 47 2D 31 36 44 34 53 - 20 20 20 20 20 20 20 20 DG-16D4S

0020: 30 32 37 32 00 00 00 00 - 00 00 00 00 00 00 00 00 0272............

0030: 00 00 00 00 41 30 41 30 - 00 00 00 00 00 00 00 00 ....A0A0........

0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0060: 44 37 31 31 43 47 30 32 - 30 39 31 35 30 30 33 34 D711CG0209150034

0070: 55 20 20 20 U



0000: C0 85 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0010: 00 00 00 00 37 44 31 31 - 47 43 32 30 39 30 35 31 ....7D11GC209051

0020: 30 30 34 33 20 55 20 20 - 00 00 00 00 00 00 32 30 0043 U ......20

0030: 32 37 20 20 20 20 4C 50 - 53 44 20 20 20 20 47 44 27 LPSD GD

0040: 31 2D 44 36 53 34 20 20 - 20 20 20 20 20 20 00 00 1-D6S4 ..

0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0060: 00 00 00 0F 00 40 00 04 - 00 02 06 00 00 00 00 00 [email protected]

0070: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0080: 03 00 78 00 78 00 78 00 - 78 00 00 00 00 00 00 00 ..x.x.x.x.......

0090: 00 00 F8 00 10 02 00 00 - 02 02 00 00 60 00 40 00 ............`[email protected]

00A0: F8 00 10 02 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

00B0: 3F 20 00 00 ? ..



0000: 44 37 31 31 43 47 30 32 - 30 39 31 35 30 30 33 34 D711CG0209150034

0010: 55 20 20 20 FF FF FF FF - 30 45 31 31 30 34 30 39 U ....0E110409

0020: 31 36 36 31 31 35 58 58 - 41 30 FF FF 53 34 50 30 166115XXA0..S4P0

0030: 35 32 31 30 30 30 30 30 - 30 37 30 33 35 31 00 00 52100000070351..

0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 41 30 FF FF ............A0..



Hashing Drive: ................



Dummy.bin file saved to Dummy.bin

Loading firmware from buffer

Inquiry string found

Identify string found

Drive key @ 0xA030
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

Firmware Osig: [PLDS DG-16D4S 0272]

Firmware is: SlimKey Extract

Key database updated



Auto-Loading firmware file C:\Users\ataroreh8132\Desktop\JungleFlasher v0.1.92 Beta (304)\firmware\LTPlus-0272-v3.0.bin

MD5 hash: 76b991307ddd5b2af581d0608e671b36

Genuine LT plus v3.0

Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF

Firmware Osig: [PLDS DG-16D4S 0272]

Firmware is: LT-Plus 3.0

Spoofing Target

DVD Key copied to target

Key Sector copied from Source to Target

Target is LT - ID strings not copied to Target



Spoofing Target

DVD Key already matches

Key Sector copied from Source to Target

Target is LT - ID strings not copied to Target

Serial data already matches





Target f/w saved as: lite_CFW.bin

Sending Vendor Intro to port 0x0000

Status 0x51

Re-sending Vendor Intro:

.........

Serial flash found with Status 0x72



Sending Device ID request to port 0x0000

Spi Status: 0x00

Manufacturer ID: 0xEF

Device ID: 0x11

Flash Name: Winbond/NEX(W25P20/NX25P20)

Flash Size: 262144 bytes



Getting Status from port 0x0000

SPi flash found with Status 0x72



Sending Chip Erase to Port 0x0000

Erasing:

Writing target buffer to flash

Writing Bank 0: ................

Writing Bank 1: ................

Writing Bank 2: ................

Writing Bank 3: ................

............

Flash Verification Test !

Reading Bank 0: ................

Reading Bank 1: ................

Reading Bank 2: ................

Reading Bank 3: ................

Dumped in 5070mS



Write Verify Failed !

Sending Vendor Outro to port 0x0000

Drive is Slim Lite-On..



Key found in KeyDB at record (369 - halo reach)

Key is: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

Key has been tested and verified, thanks C4eva !
 

capsone

VIP Member
Jun 18, 2011
332
0
sounds like u went to deep or maybe off target a bit ive heard of people having luck putting a dab of conductive glue in the hole but CANT CONFIRM you could always replace the chip