GENERAL write verify failed after kamikaze

dieginho

Junior Member
Feb 1, 2011
13
0
new jersey
hi all. i did the kamikaze on my 1071 winbond slim,
i use ck3pro, 360usb
i thoght everything went fine until i got to the write verify part it said "write verify failed" i try again and is still the same so i put the drive back in the xbox anyway. im confuse because i can play my originals and buckups fine. but the problem is i cannot lock my drive back again
[FONT=Calibri,Calibri][FONT=Calibri,Calibri]"To re[/FONT][/FONT]-[FONT=Calibri,Calibri][FONT=Calibri,Calibri]lock the drive it must be in vendor mode
So once again – Press [/FONT][/FONT]Intro /Device ID " i do this and still doesnt lock :crazy:
maybe i drill too deep. my concern is this safe to play online
i appreciate any help
Code:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
JungleFlasher 0.1.92 Beta (304)
Session Started Mon Feb 06 20:55:37 2012
 
This is a Wow 64 process running on 2 x 64 bit CPUs 
X360USB PRO detected, Version 0.18
 
portio64.sys Driver Installed 
portio64.sys Driver Started, thanks Schtrom ! 
Found 3 I/O Ports.
Found 0 Com Ports.
Found 3 windows drives C: D: E:
Found 1 CD/DVD drives E:
 
Drive is Lite-On.. 
Drive is Lite-On.. 
 
 
0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS    
0010: 44 47 2D 31 36 44 34 53 - 20 20 20 20 20 20 20 20 DG-16D4S        
0020: 31 30 37 31 00 00 00 00 - 00 00 00 00 00 00 00 00 1071............
0030: 00 00 00 00 41 30 42 30 - 00 00 00 00 00 00 00 00 ....A0B0........
0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0060: 44 37 31 37 42 42 31 32 - 31 36 31 30 30 30 45 38 D717BB12161000E8
0070: 4B 20 20 20                                       K               
 
Sending Vendor Intro to port 0x0000
Status 0x51
Re-sending Vendor Intro: 
......
Serial flash found with Status 0x72
 
Sending Device ID request to port 0x0000
Manufacturer ID: 0xEF
Device ID: 0x11
Flash Name:  Winbond/NEX(W25P20/NX25P20)
Flash Size:  262144 bytes
............
Key: ****************************************is 
verified, Thanks C4eva
 
Grabbing Key sector: ................
Key Sector verified.
Grabbing Serial info: ........
 
Drive is Lite-On.. 
0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS    
0010: 44 47 2D 31 36 44 34 53 - 20 20 20 20 20 20 20 20 DG-16D4S        
0020: 31 30 37 31 00 00 00 00 - 00 00 00 00 00 00 00 00 1071............
0030: 00 00 00 00 41 30 42 30 - 00 00 00 00 00 00 00 00 ....A0B0........
0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0060: 44 37 31 37 42 42 31 32 - 31 36 31 30 30 30 45 38 D717BB12161000E8
0070: 4B 20 20 20                                       K               
 
0000: C0 85 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0010: 00 00 00 00 37 44 37 31 - 42 42 32 31 36 31 30 31 ....7D71BB216101
0020: 30 30 38 45 20 4B 20 20 - 00 00 00 00 00 00 30 31 008E K  ......01
0030: 31 37 20 20 20 20 4C 50 - 53 44 20 20 20 20 47 44 17    LPSD    GD
0040: 31 2D 44 36 53 34 20 20 - 20 20 20 20 20 20 00 00 1-D6S4        ..
0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0060: 00 00 00 0F 00 40 00 04 - 00 02 06 00 00 00 00 00 [email protected]
0070: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0080: 03 00 78 00 78 00 78 00 - 78 00 00 00 00 00 00 00 ..x.x.x.x.......
0090: 00 00 F8 00 10 02 00 00 - 02 02 00 00 60 00 40 00 ............`[email protected]
00A0: F8 00 10 02 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00B0: 3F 20 00 00                                       ? ..            
 
0000: 44 37 31 37 42 42 31 32 - 31 36 31 30 30 30 45 38 D717BB12161000E8
0010: 4B 20 20 20 FF FF FF FF - 31 45 31 30 31 30 35 30 K   ....1E101050
0020: 31 36 33 37 35 58 58 52 - 41 30 FF FF 53 35 50 31 16375XXRA0..S5P1
0030: 35 32 35 30 30 30 30 30 - 30 33 35 35 33 34 00 00 52500000035534..
0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 42 30 FF FF ............B0..
 
Hashing Drive: ................
 
Dummy.bin file saved to diego
Loading firmware from buffer
Inquiry string found
Identify string found
Drive key @ 0xA030 ************************
Firmware Osig: [PLDS    DG-16D4S        1071]
Firmware is:  SlimKey Extract                 
Key added to database
 
Auto-Loading firmware file C:\Users\diego\jungleflasher\JungleFlasher v0.1.92 Beta (304)\firmware\LTPlus-1071-v3.0.bin
MD5 hash:  3d1243454d9c6c1cd2760b8ea5f5c648
Genuine LT plus v3.0
Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
Firmware Osig: [PLDS    DG-16D4S        1071]
Firmware is:  LT-Plus 3.0                     
Spoofing Target
DVD Key copied to target
Key Sector copied from Source to Target
Target is LT - ID strings not copied to Target
 
Sending Vendor Intro to port 0x0000
Status 0x51
Re-sending Vendor Intro: 
......
Serial flash found with Status 0x72
 
Sending Device ID request to port 0x0000
Spi Status: 0x8C
Manufacturer ID: 0xEF
Device ID: 0x11
Flash Name:  Winbond/NEX(W25P20/NX25P20)
Flash Size:  262144 bytes
 
Sending Spi UnLock request to Port 0x0000
......................................................................................................................................................................................................................................
Spi Status: 0x00
 
Getting Status from port 0x0000
Invalid Status 0x80
 
Getting Status from port 0x0000
Invalid Status 0x0
 
Getting Status from port 0x0000
Invalid Status 0x0
 
Getting Status from port 0x0000
Invalid Status 0x0
Sending Vendor Intro to port 0x0000
Status 0x51
Re-sending Vendor Intro: 
.
Serial flash found with Status 0x72
 
Sending Device ID request to port 0x0000
Spi Status: 0x01
Manufacturer ID: 0x1
Device ID: 0x1
Flash Name:  Unknown type
Flash Size:  n/a
Unknown flash type Read aborted !
Unknown flash type Write aborted !
Unknown flash type Write aborted !
Unknown flash type Write aborted !
Spoofing Target
DVD Key already matches
Key Sector copied from Source to Target
Target is LT - ID strings not copied to Target
Serial data already matches
 
Unknown flash type Write aborted !
Unknown flash type Read aborted !
Drive is Lite-On.. 
 
Key found in KeyDB at record (1 - diego xbox slim)
Key is: **************************
Key has been tested and verified, thanks C4eva ! 
Sending Vendor Intro to port 0x0000
Status 0x51
Sending Vendor Intro to port 0x0000
Status 0x51
Re-sending Vendor Intro: 
.
Serial flash found with Status 0x72
 
Sending Device ID request to port 0x0000
Spi Status: 0x01
Manufacturer ID: 0x1
Device ID: 0x1
Flash Name:  Unknown type
Flash Size:  n/a
PortIO unloaded.
Drive is Lite-On.. 
 
Key found in KeyDB at record (1 - diego xbox slim)
Key is: ***************************
Key has been tested and verified, thanks C4eva ! 
Sending Vendor Intro to port 0x0000
Status 0x51
Re-sending Vendor Intro: 
.
Serial flash found with Status 0x72
 
Sending Device ID request to port 0x0000
Spi Status: 0x01
Manufacturer ID: 0x1
Device ID: 0x1
Flash Name:  Unknown type
Flash Size:  n/a
Sending Vendor Intro to port 0x0000
Status 0x51
Re-sending Vendor Intro: 
.
Serial flash found with Status 0x72
 
Sending Device ID request to port 0x0000
Spi Status: 0x8C
Manufacturer ID: 0xEF
Device ID: 0x11
Flash Name:  Winbond/NEX(W25P20/NX25P20)
Flash Size:  262144 bytes
 
Getting Status from port 0x0000
SPi flash found with Status 0x72
Spi is locked, Aborting!
 
Sending Spi UnLock request to Port 0x0000
................................................................................................................................................................................................................................................................................................................................................................................................
Spi Status: 0x00
 
Getting Status from port 0x0000
Serial flash found with Status 0x72
Reading Drive Key.
............
Authorised !
Grabbing sector 0x3E000.
................
Blank 3E000 sector detected!
Known f/w confirmed !
Sending Vendor Intro to port 0x0000
Status 0x51
Re-sending Vendor Intro: 
......
Serial flash found with Status 0x72
 
Sending Device ID request to port 0x0000
Manufacturer ID: 0xEF
Device ID: 0x11
Flash Name:  Winbond/NEX(W25P20/NX25P20)
Flash Size:  262144 bytes
 
Updating flash for on-line dump.
 
Sending Sector Erase to Port 0x0000
Erasing: 0x3E000
Writing: 0x3E000 
............
Reading Bank 0: ................
Reading Bank 1: ................
Reading Bank 2: ................
Reading Bank 3: ................
Dumped in 4726mS
 
Restoring sector 0x3E000.
 
Sending Sector Erase to Port 0x0000
Erasing: 0x3E000
Writing: 0x3E000 
............
Authorised !
................
Restore 0x3E000 verified !
 
Lite-On Dump file saved to Lite-OFW.bin
Loading firmware from buffer
Drive key @ n/a ********************************
Firmware Osig: [PLDS    DG-16D4S        1071]
Firmware is:  Stock                           
Key database updated
 
Auto-Loading firmware file C:\Users\diego\jungleflasher\JungleFlasher v0.1.92 Beta (304)\firmware\LTPlus-1071-v3.0.bin
MD5 hash:  3d1243454d9c6c1cd2760b8ea5f5c648
Genuine LT plus v3.0
Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
Firmware Osig: [PLDS    DG-16D4S        1071]
Firmware is:  LT-Plus 3.0                     
Spoofing Target
DVD Key copied to target
Key Sector copied from Source to Target
Target is LT - ID strings not copied to Target
 
Drive is Lite-On.. 
 
Key found in KeyDB at record (1 - diego xbox slim)
Key is: *************************
Key has been tested and verified, thanks C4eva ! 
Sending Vendor Intro to port 0x0000
Status 0x51
Re-sending Vendor Intro: 
.....
Serial flash found with Status 0x72
 
Sending Device ID request to port 0x0000
Spi Status: 0x00
Manufacturer ID: 0xEF
Device ID: 0x11
Flash Name:  Winbond/NEX(W25P20/NX25P20)
Flash Size:  262144 bytes
 
Getting Status from port 0x0000
SPi flash found with Status 0x72
 
Sending Chip Erase to Port 0x0000
Erasing:
Writing target buffer to flash
Writing Bank 0: ................
Writing Bank 1: ................
Writing Bank 2: ................
Writing Bank 3: ................
............
Flash Verification Test !
Reading Bank 0: ................
Reading Bank 1: ................
Reading Bank 2: ................
Reading Bank 3: ................
Dumped in 4649mS
 
Write Verify Failed !
Spoofing Target
DVD Key already matches
Key Sector copied from Source to Target
Target is LT - ID strings not copied to Target
Serial data already matches
 
 
Getting Status from port 0x0000
Invalid Status 0x50
Sending Vendor Intro to port 0x0000
Status 0x51
Re-sending Vendor Intro: 
.
Serial flash found with Status 0x72
 
Sending Device ID request to port 0x0000
Spi Status: 0x01
Manufacturer ID: 0x1
Device ID: 0x1
Flash Name:  Unknown type
Flash Size:  n/a
Sending Vendor Intro to port 0x0000
Status 0x51
Sending Vendor Intro to port 0x0000
Status 0x51
Re-sending Vendor Intro: 
.
Serial flash found with Status 0x72
 
Sending Device ID request to port 0x0000
Spi Status: 0x01
Manufacturer ID: 0x1
Device ID: 0x1
Flash Name:  Unknown type
Flash Size:  n/a
Sending Vendor Intro to port 0x0000
Status 0x51
Re-sending Vendor Intro: 
.
Serial flash found with Status 0x72
 
Sending Device ID request to port 0x0000
Spi Status: 0x01
Manufacturer ID: 0x1
Device ID: 0x1
Flash Name:  Unknown type
Flash Size:  n/a
Sending Vendor Outro to port 0x0000
Drive is Lite-On.. 
 
Key found in KeyDB at record (1 - diego xbox slim)
Key is: *****************************
Key has been tested and verified, thanks C4eva ! 
Sending Vendor Outro to port 0x0000
Drive is Lite-On.. 
 
Key found in KeyDB at record (1 - diego xbox slim)
Key is: ********************
Key has been tested and verified, thanks C4eva ! 
Sending Vendor Intro to port 0x0000
Status 0x90
Re-sending Vendor Intro: 
.
Serial flash found with Status 0x72
 
Sending Device ID request to port 0x0000
Spi Status: 0x01
Manufacturer ID: 0x1
Device ID: 0x1
Flash Name:  Unknown type
Flash Size:  n/a
Sending Vendor Intro to port 0x0000
Status 0x51
Re-sending Vendor Intro: 
.
Serial flash found with Status 0x72
 
Sending Device ID request to port 0x0000
Spi Status: 0x00
Manufacturer ID: 0xEF
Device ID: 0x11
Flash Name:  Winbond/NEX(W25P20/NX25P20)
Flash Size:  262144 bytes
 
Getting Status from port 0x0000
SPi flash found with Status 0x72
 
Sending Chip Erase to Port 0x0000
Erasing:
Writing target buffer to flash
Writing Bank 0: ................
Writing Bank 1: ................
Writing Bank 2: ................
Writing Bank 3: ................
............
Flash Verification Test !
Reading Bank 0: ................
Reading Bank 1: ................
Reading Bank 2: ................
Reading Bank 3: ................
Dumped in 4743mS
 
Write Verify Failed !
 
Getting Status from port 0x0000
Invalid Status 0x50
Sending Vendor Outro to port 0x0000
Drive is Lite-On.. 
 
Key found in KeyDB at record (1 - diego xbox slim)
Key is: ***********************
Key has been tested and verified, thanks C4eva ![COLOR="Silver"]
---------- Post added at 19:52 ---------- Previous post was at 19:45 ----------

[/COLOR]edit . i forgot to click on phat i think i clicked slim on mtk flash 32 tab before drilling the chip. do this make a difference
 
Last edited by a moderator:
No it shouldnt. Plain and simple it seems you may have drilled too far or slightly off. Even though it works, this could cause the SPI to not respond properly to commands.

Best case: you play on live and if MS tries to lock it the lock wont go through and you are still unlocked.
Worst case: they detect it is unlocked and you get banned.

My advice: get a replacement PCB if you are paranoid about live, or use the working PCB you have if not.
 
  • Like
Reactions: dieginho

dieginho

Junior Member
Feb 1, 2011
13
0
new jersey
just an update i used a small drop of conductive wire glue on the drilled hole as someone here mention and it worked now it verifies ok and i could also lock my drive (i couldnt lock my drive before so it was already unlock when i openned JF)
 
Sep 9, 2011
123
0
just an update i used a small drop of conductive wire glue on the drilled hole as someone here mention and it worked now it verifies ok and i could also lock my drive (i couldnt lock my drive before so it was already unlock when i openned JF)

hey does this work? pcb is dead green blinking light what kind of wire conductive glue