XENON, Hitachi Spoofed as Sammy - dvd key.

tegezee

VIP Member
Sep 30, 2011
169
23
Lansing, Michigan
A customer has brought me a xenon 360 with a hitachi drive in it spoofed as a sammy m28. When I dumped the firmware the dvdkey came up as 747474 ect, and I can't find the right dvdkey in the bin file using a hex editor. I have a nand-x, ck3i, x360 usb pro, & a coolrunner but from what I know you can't rgh xenon mb's or jtag this 9199 dash idk. I have looked everywhere for the answer and I the same problem as this guy but I have have not updated and games still play but need to update. If I can get the orig dvd key I have a sammy m28 to replace it with the original drive, flash it back to orig fw then put the latest lt+. Thanks in advanced for any help with this.

Here is the jf log


No Hitachi drives were found!
Playing 79Unlock Audio CD
Pausing 79Unlock Audio CD, after 500mS
Ejecting 79Unlock Audio CD
Setting bit 3 @ 0x5BD
Executing code in Ram
Done!
Dumping f/w of Hitachi 0078/0079 by Ram Upload Method via WIN32 API
................................
Drive is rev 0079-4E10

Dumped in 1240mS

Hitachi Dump file saved to Hit-OFW.bin
Loading firmware from buffer
Inquiry string found
Identify string found
Drive key @ 0x4E10 74747474747474747474747474747474
Firmware Osig: [HL-DT-STDVD-ROM GDR3120L0079]
Spoofed As: [TSSTcorpDVD-ROM TS-H943Ams28]
Firmware is: iXtreme :79:V1.4-8x
Key added to database

Loading Hitachi Dump to Source Buffer
Key data saved to C:\Users\Dj keyz\Desktop\Brennen\Key.bin

Loading firmware file C:\Users\Dj keyz\Desktop\Brennen\Key.bin
MD5 hash: 2d6da0dd1c5951c1ae3a4c0e8edeeebf
Inquiry string found
Identify string found
Drive key @ 0x4E10 74747474747474747474747474747474
Firmware Osig: [HL-DT-STDVD-ROM GDR3120L0079]
Spoofed As: [TSSTcorpDVD-ROM TS-H943Ams28]
Firmware is: iXtreme :79:V1.4-8x
Loading firmware file C:\Users\Dj keyz\Desktop\Brennen\Hit-OFW.bin
MD5 hash: ec302ef8aa09a13e849c0f90e0170d3a
Inquiry string found
Identify string found
Drive key @ 0x4E10 74747474747474747474747474747474
Firmware Osig: [HL-DT-STDVD-ROM GDR3120L0079]
Spoofed As: [TSSTcorpDVD-ROM TS-H943Ams28]
Firmware is: iXtreme :79:V1.4-8x
XECUTER X360USB PRO removed.

Loading firmware file C:\Users\Dj keyz\Desktop\Brennen\Hit-OFW.bin
MD5 hash: ec302ef8aa09a13e849c0f90e0170d3a
Inquiry string found
Identify string found
Drive key @ 0x4E10 74747474747474747474747474747474
Firmware Osig: [HL-DT-STDVD-ROM GDR3120L0079]
Spoofed As: [TSSTcorpDVD-ROM TS-H943Ams28]
Firmware is: iXtreme :79:V1.4-8x
 
Last edited:

Oggy

Staff member
Troll Eating Dogs
Mar 1, 2010
3,363
128
Thats not the full log AND that is the drive key..

Someone f**ked up, FWTB and Laheys old scripts were they only way to flash a v79 to that fw. FWTB uses 00000000000000000000000000000000 as they key, Lahey used to use 74747474747474747474747474747474 IIRC.

Not sure what key stage 2 of SUL uses, but I'll check after work.

---------- Post added at 05:30 ---------- Previous post was at 05:22 ----------

Even the old batch scripts have; 50CF4744D973A44C7173650A0DE980CD as the key :/
 

Oggy

Staff member
Troll Eating Dogs
Mar 1, 2010
3,363
128
Where is the full log?
 

nofeloniesyet

VIP Member
Jan 16, 2011
4,852
128
Nowhere
Thanks a lot man...
Can you use this on updated dashes to? Also can I use nand-x instead of j-runner?
before you go to all that trouble,annd thats zactly what itll be,let oggy help u,he knows what hes doing on everything xbox related,but fw and jungleflasher are his area of real expertise.
 

TilVl

VIP Member
May 11, 2011
1,383
0
Had this same exact proble. Could never figureit out and never got it working. This was before rgh. I googled, askmed forums. Dug through the hex. Never found anything.

Sent from my SGH-T839 using Tapatalk
 

Oggy

Staff member
Troll Eating Dogs
Mar 1, 2010
3,363
128
12:12 `Oggy • I'm trying to understand htf he done it
12:12 `Oggy • because I can think of only one way
12:12 `Oggy • and the log isnt usefuk
12:13 `Oggy • as you'd have to flash it 3 times
12:13 `Oggy • lol
12:13 `Oggy • I guess free flash would do it
12:13 `Oggy • somehat
12:14 `Oggy • fwtb and batch sripts were the only way to flash that fw before jf / freeflash - FACT
12:14 `Oggy • FWTB smart hack patcher would calculate the key
12:15 `Oggy • generic 79 fw in scripts had a unique key
12:15 `Oggy • not a 7474 placeholder
12:15 `Oggy • how ?