Quantcast
Channel: Team Xecuter
Viewing all articles
Browse latest Browse all 6917

LITEON 0225 Liteon slim

$
0
0
Ive just done the the kamikaze hack I've done a couple and all worked but his one I'm having problems when I open I jungle flasher I can unlock and relock but when write fw to it I get write verify failed but when I put it in my Xbox originals and backups work fine will this be ok? I have noticed that the drive label is showing 0225 but the original fw for it is 0272 I tried the stock 0272 for it and it verifies just not with lt3.0 fw drive also ejects ok



~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
JungleFlasher 0.1.92 Beta (304)
Session Started Sun Jun 09 11:31:48 2013

This is a 32 bit process running on a 32 bit CPU
X360USB PRO detected, Version 0.18

Found 1 I/O Ports.
Found 3 Com Ports.
Found 7 windows drives A: C: D: E: F: G: H:
Found 5 CD/DVD drives D: E: F: G: H:

Drive is Slim Lite-On..

Key found in KeyDB at record (53 - New Folder (15))
Key is: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
Key has been tested and verified, thanks C4eva !
Drive is Slim Lite-On..

Key found in KeyDB at record (53 - New Folder (15))
Key is: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
Key has been tested and verified, thanks C4eva !


0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS
0010: 44 47 2D 31 36 44 34 53 - 20 20 20 20 20 20 20 20 DG-16D4S
0020: 30 32 37 32 00 00 00 00 - 00 00 00 00 00 00 00 00 0272............
0030: 00 00 00 00 41 30 41 30 - 00 00 00 00 00 00 00 00 ....A0A0........
0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0060: 44 37 31 31 43 47 30 31 - 38 38 30 38 30 30 38 48 D711CG018808008H
0070: 32 20 20 20 2

Sending Password to Drive on port 0x0000
Done!
Sending Vendor Intro to port 0x0000

Serial flash found with Status 0x72

Sending Device ID request to port 0x0000
Manufacturer ID: 0xEF
Device ID: 0x11
Flash Name: Winbond/NEX(W25P20/NX25P20)
Flash Size: 262144 bytes
Loading firmware file C:\Documents and Settings\Desktop\myfw\Dummy.bin
MD5 hash: 5a3d26e6fbad919888db085f3665fc2a
Inquiry string found
Identify string found
Drive key @ 0xA030 xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
Firmware Osig: [PLDS DG-16D4S 0272]
Firmware is: SlimKey Extract
Auto-Loading firmware file C:\Documents and Settings Desktop\JungleFlasher v0.1.92 Beta (304)\firmware\LTPlus-0272-v3.0.bin
MD5 hash: 76b991307ddd5b2af581d0608e671b36
Genuine LT plus v3.0
Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
Firmware Osig: [PLDS DG-16D4S 0272]
Firmware is: LT-Plus 3.0
Spoofing Target
DVD Key copied to target
Key Sector copied from Source to Target
Target is LT - ID strings not copied to Target

Spoofing Target
DVD Key already matches
Key Sector copied from Source to Target
Target is LT - ID strings not copied to Target
Serial data already matches


Getting Status from port 0x0000
SPi flash found with Status 0x72

Sending Chip Erase to Port 0x0000
Erasing:
Writing target buffer to flash
Writing Bank 0: ................
Writing Bank 1: ................
Writing Bank 2: ................
Writing Bank 3: ................
............
Flash Verification Test !
Reading Bank 0: ................
Reading Bank 1: ................
Reading Bank 2: ................
Reading Bank 3: ................
Dumped in 5921mS

Write Verify Failed !
Sending Vendor Outro to port 0x0000
Drive is Slim Lite-On..

Key found in KeyDB at record (53 - New Folder (15))
Key is: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
Key has been tested and verified, thanks C4eva !

Viewing all articles
Browse latest Browse all 6917

Trending Articles