duda fhaseo winwond

el tema esta en que de fhaseos ni papa de rgh ps3 y demas lo que sea [carcajad] [carcajad] me han traido 2 xbox 360 un 0225 y un 0401 con windond las 2 la 0225 metodo kamikace y ok la 401 esto es lo que me aparece en el log


Dummy.bin file saved to Dummy.bin

Loading firmware from buffer

Inquiry string found

Identify string found

Drive key @ 0xA030 D4750755105695FA0177D8CB16D8109D

Firmware Osig: [PLDS DG-16D4S 0401]

Firmware is: SlimKey Extract

Key added to database



Auto-Loading firmware file D:\Documents and Settings\Administrador.DESKTOP.000\Escritorio\JungleFlasher.0.1.94.Beta(320)\JungleFlasher v0.1.94 Beta (320)\firmware\LTPlus-0401-v3.0.bin

MD5 hash: 87fba52607d01d3c73722f9f818588c9

Genuine LT plus v3.0

Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF

Firmware Osig: [PLDS DG-16D4S 0401]

Firmware is: LT-Plus 3.0

Spoofing Target

DVD Key copied to target

Key Sector copied from Source to Target

Target is LT - ID strings not copied to Target



Sending Vendor Intro to port 0x0000

Status 0x51

Re-sending Vendor Intro:

...............................................

Serial flash found with Status 0x72



Sending Device ID request to port 0x0000

Spi Status: 0x8C

Manufacturer ID: 0xEF

Device ID: 0x11

Flash Name: Winbond/NEX(W25P20/NX25P20)

Flash Size: 262144 bytes



Sending Spi UnLock request to Port 0x0000

...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

Spi Status: 0x00



Getting Status from port 0x0000

SPi flash found with Status 0x72



Sending Chip Erase to Port 0x0000

Erasing:

Writing target buffer to flash

Writing Bank 0: ................

Writing Bank 1: ................

Writing Bank 2: ................

Writing Bank 3: ................

............

Flash Verification Test !

Reading Bank 0: ................

Reading Bank 1: ................

Reading Bank 2: ................

Reading Bank 3: ................

Dumped in 5406mS



Write Verify Failed !
y luego
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

JungleFlasher 0.1.94 Beta (320)

Session Started Wed Oct 22 15:20:15 2014



This is a 32 bit process running on a 32 bit CPU

X360USB PRO detected, Version 0.20



Found 1 I/O Ports.

Found 1 Com Ports.

Found 3 windows drives A: C: D:

Found 0 CD/DVD drives



Sending Vendor Intro to port 0x0000

Status 0x51

Re-sending Vendor Intro:

......................

Serial flash found with Status 0x72



Sending Device ID request to port 0x0000

Spi Status: 0x00

Manufacturer ID: 0xEF

Device ID: 0x11

Flash Name: Winbond/NEX(W25P20/NX25P20)

Flash Size: 262144 bytes



Getting Status from port 0x0000

Serial flash found with Status 0x72

Reading Drive Key.

............

Authorised !

Grabbing sector 0x3E000.

................

Modded sector detected !

Ready for on-line dump.



Reading Bank 0: ................

Reading Bank 1: ................

Reading Bank 2: ................

Reading Bank 3: ................

Dumped in 5688mS



Restoring sector 0x3E000.



Sending Sector Erase to Port 0x0000

Erasing: 0x3E000

Writing: 0x3E000

............

Authorised !

................

Restore 0x3E000 verified !



Lite-On Dump file saved to Lite-OFW.bin

Loading firmware from buffer

Drive key @ n/a D4750755105695FA0177D8CB16D8109D

Firmware Osig: [PLDS DG-16D4S 0401]

Firmware is: LT-Plus 3.0

Key database updated



Auto-Loading firmware file D:\Documents and Settings\Administrador.DESKTOP.000\Escritorio\JungleFlasher.0.1.94.Beta(320)\JungleFlasher v0.1.94 Beta (320)\firmware\LTPlus-0401-v3.0.bin

MD5 hash: 87fba52607d01d3c73722f9f818588c9

Genuine LT plus v3.0

Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF

Firmware Osig: [PLDS DG-16D4S 0401]

Firmware is: LT-Plus 3.0

Spoofing Target

DVD Key copied to target

Key Sector copied from Source to Target

Target is LT - ID strings not copied to Target



Drive is Slim Lite-On..



Key found in KeyDB at record (2 - la2)

Key is: D4750755105695FA0177D8CB16D8109D

Key has been tested and verified, thanks C4eva !



Getting Status from port 0x0000

Invalid Status 0x50

Sending Vendor Intro to port 0x0000

Status 0x51

Re-sending Vendor Intro:

....

Serial flash found with Status 0x72



Sending Device ID request to port 0x0000

Spi Status: 0x00

Manufacturer ID: 0xEF

Device ID: 0x11

Flash Name: Winbond/NEX(W25P20/NX25P20)

Flash Size: 262144 bytes



Getting Status from port 0x0000

SPi flash found with Status 0x72



Sending Chip Erase to Port 0x0000

Erasing:

Writing target buffer to flash

Writing Bank 0: ................

Writing Bank 1: ................

Writing Bank 2: ................

Writing Bank 3: ................

............

Flash Verification Test !

Reading Bank 0: ................

Reading Bank 1: ................

Reading Bank 2: ................

Reading Bank 3: ................

Dumped in 5657mS



Write Verify Failed !

no se lo que estoy haciendo mal nota no he utilizado la resistencia
lo de Write verified failed! siempre sale, no te preocupes, por lo que veo al principio del log, es que lo flasheaste bien, pero... te aseguraste de que la key estaba correcta??? porque en el log pone la key en blanco (FFFFFFF)....

Una vez flasheado (aunque te de error de verificación) solo tienes que bloquear el lector (yo lo hago con el programa de los rusos (unlockSPI.exe) pero también lo puedes hacer desde el mismo jungleflasher (con la resistencia puesta).
gracias por constestar en un principio esta bien el dueño no me ha dicho nada con lo cual tampoco tenia ningun backup para comprobarlo pero los originales los cogia
2 respuestas