Jump to content


Photo

Xbox360 Slim From China Have Fat Drive Into It


  • Please log in to reply
7 replies to this topic

#1 bluemimmosa

bluemimmosa

    X-S Member

  • Members
  • Pip
  • 64 posts
  • Xbox Version:unk
  • 360 version:v3.0 (falcon)

Posted 05 March 2012 - 08:23 AM

Hello everybody,
I have a xbox360 that is brought from china and it has a fat liteon drive installed in it, so now i glitched it and have bought a slim 9504 drive for it. But when i read the fat drive that was installed on it, i can get the dummy.bin. the i used that file to flash the 9504 drive i bought separately for it, it gives me authorization failed. So now after that when i connect the drive to my RGH console every 360 gmaes gives me play DVD error, while the xexmenu dvd that i burnt plays fine...
Any idea on what should i do to fix the problem . The log from the JF is below..

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
JungleFlasher 0.1.92 Beta (304)
Session Started Mon Mar 05 10:33:26 2012

This is a 32 bit process running on a 32 bit CPU
X360USB PRO detected, Version 0.18

Found 1 I/O Ports.
Found 1 Com Ports.
Found 4 windows drives C: D: E: F:
Found 1 CD/DVD drives E:

Drive is Lite-On..
Drive is Lite-On..
Sending Vendor Intro to port 0x0000
Status 0x90

PhatKey extraction failed!

Sending Vendor Intro to port 0x0000
Status 0x90
Re-sending Vendor Intro:
.........................
Aborted by User!
Drive is Lite-On..
Drive is Lite-On..
Sending Vendor Intro to port 0x0000
Status 0x90
Re-sending Vendor Intro:
............................
Serial flash found with Status 0x52

Extracted drive key passed Verification !

key returned: 51400107C49CCD6853C150A9885EC6ED
0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS
0010: 44 47 2D 31 36 44 32 53 - 20 20 20 20 20 20 20 20 DG-16D2S
0020: 30 32 35 31 30 43 41 30 - 41 30 44 36 30 38 43 47 02510CA0A0D608CG
0030: 37 33 38 38 30 38 30 30 - 33 34 38 20 20 20 00 00 73880800348 ..
0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS
0010: 44 47 2D 31 36 44 32 53 - 20 20 20 20 20 20 20 20 DG-16D2S
0020: 30 32 35 31 30 43 20 20 - 00 00 00 00 00 00 00 00 02510C ........
0030: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0000: C0 85 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0010: 00 00 00 00 44 36 30 38 - 43 47 37 33 38 38 30 38 ....D608CG738808
0020: 30 30 33 34 38 20 20 20 - 00 00 00 00 00 00 32 30 00348 ......20
0030: 31 35 43 30 20 20 4C 50 - 53 44 20 20 20 20 47 44 15C0 LPSD GD
0040: 31 2D 44 36 53 32 20 20 - 20 20 20 20 20 20 20 20 1-D6S2
0050: 20 20 20 20 20 20 20 20 - 20 20 20 20 20 20 00 00 ..
0060: 00 00 00 0B 00 00 00 04 - 00 02 06 00 00 00 00 00 ................
0070: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0080: 03 00 78 00 78 00 E3 00 - 78 00 00 00 00 00 00 00 ..x.x...x.......
0090: 00 00 00 00 00 00 00 00 - 02 02 00 00 68 00 00 00 ............h...
00A0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00B0: 20 20 00 00 ..

0000: 44 36 30 38 43 47 37 33 - 38 38 30 38 30 30 33 34 D608CG7388080034
0010: 38 20 20 20 FF FF FF FF - FF FF FF FF FF FF FF FF 8 ............
0020: FF FF FF FF FF FF FF FF - 41 30 FF FF FF FF FF FF ........A0......
0030: FF FF FF FF FF FF FF FF - FF FF FF FF FF FF FF FF ................
0040: FF FF FF FF FF FF FF FF - FF FF FF FF 41 30 FF FF ............A0..


Dummy.bin file saved to slim dummy.bin
Loading firmware from buffer
Inquiry string found
Identify string found
Drive key @ 0xA030 51400107C49CCD6853C150A9885EC6ED
Firmware Osig: [PLDS DG-16D2S 0251]
Firmware is: PhatKey Extract
Key added to database

Drive is Slim Lite-On..
Loading firmware file C:\Documents and Settings\Admin\Desktop\JungleFlasher v0.1.92 Beta (304)\firmware\LTPlus-0272-v3.0.bin
MD5 hash: 76b991307ddd5b2af581d0608e671b36
Genuine LT plus v3.0
Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
Firmware Osig: [PLDS DG-16D4S 0272]
Firmware is: LT-Plus 3.0
Spoofing Target
DVD Key copied to target
Key Sector copied from Source to Target
Target is LT - ID strings not copied to Target

Spoofing Target
DVD Key already matches
Key Sector copied from Source to Target
Target is LT - ID strings not copied to Target

Spoofing Target
DVD Key already matches
Key Sector copied from Source to Target
Target is LT - ID strings not copied to Target


Target f/w saved as: hhhhhhhhhhhhhhhhhhhhhhh.bin
Drive is Slim Lite-On..
Drive is Slim Lite-On..


0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS
0010: 44 47 2D 31 36 44 34 53 - 20 20 20 20 20 20 20 20 DG-16D4S
0020: 39 35 30 34 00 00 00 00 - 00 00 00 00 00 00 00 00 9504............
0030: 00 00 00 00 FF FF FF FF - 00 00 00 00 00 00 00 00 ................
0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0060: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0070: 00 00 00 00 ....

Sending Password to Drive on port 0x0000
Done!
Sending Vendor Intro to port 0x0000

Serial flash found with Status 0x72

Sending Device ID request to port 0x0000
Manufacturer ID: 0xC2
Device ID: 0x11
Flash Name: MXIC(MX25L2005)
Flash Size: 262144 bytes

Getting Status from port 0x0000
SPi flash found with Status 0x72

Sending Chip Erase to Port 0x0000
Erasing:
Writing target buffer to flash
Writing Bank 0: ................
Writing Bank 1: ................
Writing Bank 2: ................
Writing Bank 3: ................
............
Flash Verification Test !
Reading Bank 0: ................
Reading Bank 1: ................
Reading Bank 2: ................
Reading Bank 3: ................
Dumped in 5919mS

Write verified OK !

Restoring sector 0x3E000.

Sending Sector Erase to Port 0x0000
Erasing: 0x3E000
Writing: 0x3E000
............
Authorisation Failed!
Restore Verify Failed !

Getting Status from port 0x0000
Invalid Status 0x50
Sending Vendor Intro to port 0x0000
Status 0x51
Re-sending Vendor Intro:
............
Serial flash found with Status 0x72

Sending Device ID request to port 0x0000
Spi Status: 0x00
Manufacturer ID: 0xC2
Device ID: 0x11
Flash Name: MXIC(MX25L2005)
Flash Size: 262144 bytes

Getting Status from port 0x0000
SPi flash found with Status 0x72

Sending Chip Erase to Port 0x0000
Erasing:
Done !
Sending Vendor Outro to port 0x0000
Sending Vendor Intro to port 0x0000
Status 0x80
Re-sending Vendor Intro:
...........
Serial flash found with Status 0x72

Sending Device ID request to port 0x0000
Spi Status: 0x00
Manufacturer ID: 0xC2
Device ID: 0x11
Flash Name: MXIC(MX25L2005)
Flash Size: 262144 bytes

Getting Status from port 0x0000
SPi flash found with Status 0x72

Sending Chip Erase to Port 0x0000
Erasing:
Writing target buffer to flash
Writing Bank 0: ................
Writing Bank 1: ................
Writing Bank 2: ................
Writing Bank 3: ................
............
Flash Verification Test !
Reading Bank 0: ................
Reading Bank 1: ................
Reading Bank 2: ................
Reading Bank 3: ................
Dumped in 6439mS

Write verified OK !

Restoring sector 0x3E000.

Sending Sector Erase to Port 0x0000
Erasing: 0x3E000
Writing: 0x3E000
............
Authorisation Failed!
Restore Verify Failed !
Sending Vendor Intro to port 0x0000
Status 0x51
Re-sending Vendor Intro:
...................
Serial flash found with Status 0x72

Sending Device ID request to port 0x0000
Spi Status: 0x00
Manufacturer ID: 0xC2
Device ID: 0x11
Flash Name: MXIC(MX25L2005)
Flash Size: 262144 bytes

Getting Status from port 0x0000
SPi flash found with Status 0x72

Sending Chip Erase to Port 0x0000
Erasing:
Writing target buffer to flash
Writing Bank 0: ................
Writing Bank 1: ................
Writing Bank 2: ................
Writing Bank 3: ................
............
Flash Verification Test !
Reading Bank 0: ................
Reading Bank 1: ................
Reading Bank 2: ................
Reading Bank 3: ................
Dumped in 6239mS

Write verified OK !

Restoring sector 0x3E000.

Sending Sector Erase to Port 0x0000
Erasing: 0x3E000
Writing: 0x3E000
............
Authorisation Failed!
Restore Verify Failed !
Loading firmware file C:\Documents and Settings\Admin\Desktop\JungleFlasher v0.1.92 Beta (304)\firmware\LTPlus-9504.bin
MD5 hash: fb7b3d4487cc17c6518b14e57ae82cc2
Genuine Lite-On Slim 9504 LT
Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
Firmware Osig: [PLDS DG-16D4S 9504]
Firmware is: LT-Plus
Spoofing Target
DVD Key copied to target
Key Sector copied from Source to Target
Target is LT - ID strings not copied to Target


Target f/w saved as: bbb.bin

Getting Status from port 0x0000
Invalid Status 0x50
Sending Vendor Intro to port 0x0000
Status 0x51
Re-sending Vendor Intro:
..............
Serial flash found with Status 0x72

Sending Device ID request to port 0x0000
Spi Status: 0x00
Manufacturer ID: 0xC2
Device ID: 0x11
Flash Name: MXIC(MX25L2005)
Flash Size: 262144 bytes

Getting Status from port 0x0000
SPi flash found with Status 0x72

Sending Chip Erase to Port 0x0000
Erasing:
Done !
Sending Vendor Outro to port 0x0000
Sending Vendor Intro to port 0x0000
Status 0x80
Re-sending Vendor Intro:
.....................
Serial flash found with Status 0x72

Sending Device ID request to port 0x0000
Spi Status: 0x00
Manufacturer ID: 0xC2
Device ID: 0x11
Flash Name: MXIC(MX25L2005)
Flash Size: 262144 bytes

Getting Status from port 0x0000
SPi flash found with Status 0x72

Sending Chip Erase to Port 0x0000
Erasing:
Writing target buffer to flash
Writing Bank 0: ................
Writing Bank 1: ................
Writing Bank 2: ................
Writing Bank 3: ................
............
Flash Verification Test !
Reading Bank 0: ................
Reading Bank 1: ................
Reading Bank 2: ................
Reading Bank 3: ................
Dumped in 6119mS

Write verified OK !

Restoring sector 0x3E000.

Sending Sector Erase to Port 0x0000
Erasing: 0x3E000
Writing: 0x3E000
............
Authorisation Failed!
Restore Verify Failed !
Sending Vendor Outro to port 0x0000
Drive is Slim Lite-On..
XECUTER X360USB PRO removed.

Loading firmware file D:\DropBox\CUSTOMER DATA\XBOX360 CUSTOMER BACKUP\dvd firm\360 slim\Dummy.bin
MD5 hash: 097ddcbcd19cb4bda4aa1bd476626acf
Parse Failed !

Loading firmware file D:\DropBox\CUSTOMER DATA\XBOX360 CUSTOMER BACKUP\dvd firm\360 slim\Dummy.bin
MD5 hash: 097ddcbcd19cb4bda4aa1bd476626acf
Parse Failed !

Loading firmware file D:\DropBox\CUSTOMER DATA\XBOX360 CUSTOMER BACKUP\dvd firm\360 slim\Dummy.bin
MD5 hash: 097ddcbcd19cb4bda4aa1bd476626acf
Parse Failed !

Loading firmware file D:\DropBox\CUSTOMER DATA\XBOX360 CUSTOMER BACKUP\dvd firm\144518503208.bin
MD5 hash: d78b05ac8d08dd9e5787e9449da64a1f
Inquiry string found
Identify string found
Drive key @ 0xA030 F129F827C05FFE1E4C236369D89F3A20
Firmware Osig: [PLDS DG-16D4S 9504]
Firmware is: SlimKey Extract
Auto-Loading firmware file C:\Documents and Settings\Admin\Desktop\JungleFlasher v0.1.92 Beta (304)\firmware\LTPlus-9504.bin
MD5 hash: fb7b3d4487cc17c6518b14e57ae82cc2
Genuine Lite-On Slim 9504 LT
Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
Firmware Osig: [PLDS DG-16D4S 9504]
Firmware is: LT-Plus
Spoofing Target
DVD Key copied to target
Key Sector copied from Source to Target
Target is LT - ID strings not copied to Target

XECUTER X360USB PRO attached.

Drive is Slim Lite-On..
Drive is Slim Lite-On..
Attempting to verify Target Key to drive on port 0x0000

Target Key not verified against drive.
DVD Key copied to target
Target is LT - ID strings not copied to Target

Target f/w saved as: new fw.bin
Sending Vendor Intro to port 0x0000
Status 0x51
Re-sending Vendor Intro:
.............
Serial flash found with Status 0x72

Sending Device ID request to port 0x0000
Spi Status: 0x00
Manufacturer ID: 0xC2
Device ID: 0x11
Flash Name: MXIC(MX25L2005)
Flash Size: 262144 bytes

Getting Status from port 0x0000
SPi flash found with Status 0x72

Sending Chip Erase to Port 0x0000
Erasing:
Writing target buffer to flash
Writing Bank 0: ................
Writing Bank 1: ................
Writing Bank 2: ................
Writing Bank 3: ................
............
Flash Verification Test !
Reading Bank 0: ................
Reading Bank 1: ................
Reading Bank 2: ................
Reading Bank 3: ................
Dumped in 5928mS

Write verified OK !

Restoring sector 0x3E000.

Sending Sector Erase to Port 0x0000
Erasing: 0x3E000
Writing: 0x3E000
............
Authorisation Failed!
Restore Verify Failed !
XECUTER X360USB PRO removed.

XECUTER X360USB PRO attached.

Drive is Slim Lite-On..

Key found in KeyDB at record (7 - dvd firm)
Key is: F129F827C05FFE1E4C236369D89F3A20
Key has been tested and verified, thanks C4eva !
Loading firmware file C:\Documents and Settings\Admin\Desktop\slim dummy.bin
MD5 hash: cfb9a146c3f16ff505566e1f0ef1b001
Inquiry string found
Identify string found
Drive key @ 0xA030 51400107C49CCD6853C150A9885EC6ED
Firmware Osig: [PLDS DG-16D2S 0251]
Firmware is: PhatKey Extract
Auto-Loading firmware file C:\Documents and Settings\Admin\Desktop\JungleFlasher v0.1.92 Beta (304)\firmware\LTPlus-0251-v3.0.bin
MD5 hash: d14fe82b96741b7a18e5c1e7adbf0a98
Genuine LT plus v3.0
Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
Firmware Osig: [PLDS DG-16D2S 0251]
Firmware is: LT-Plus 3.0
Spoofing Target
DVD Key copied to target
Target is LT - ID strings not copied to Target
Serial data already matches

Target rev is LT 02510C, serial info not copied
Loading firmware file C:\Documents and Settings\Admin\Desktop\JungleFlasher v0.1.92 Beta (304)\firmware\LTPlus-0272-v3.0.bin
MD5 hash: 76b991307ddd5b2af581d0608e671b36
Genuine LT plus v3.0
Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
Firmware Osig: [PLDS DG-16D4S 0272]
Firmware is: LT-Plus 3.0
Spoofing Target
DVD Key copied to target
Key Sector copied from Source to Target
Target is LT - ID strings not copied to Target


Target f/w saved as: rrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr.bin
Sending Vendor Intro to port 0x0000
Status 0x51
Re-sending Vendor Intro:
...........
Serial flash found with Status 0x72

Sending Device ID request to port 0x0000
Spi Status: 0x00
Manufacturer ID: 0xC2
Device ID: 0x11
Flash Name: MXIC(MX25L2005)
Flash Size: 262144 bytes

Getting Status from port 0x0000
SPi flash found with Status 0x72

Sending Chip Erase to Port 0x0000
Erasing:
Writing target buffer to flash
Writing Bank 0: ................
Writing Bank 1: ................
Writing Bank 2: ................
Writing Bank 3: ................
............
Flash Verification Test !
Reading Bank 0: ................
Reading Bank 1: ................
Reading Bank 2: ................
Reading Bank 3: ................
Dumped in 7441mS

Write verified OK !

Restoring sector 0x3E000.

Sending Sector Erase to Port 0x0000
Erasing: 0x3E000
Writing: 0x3E000
............
Authorisation Failed!
Restore Verify Failed !
XECUTER X360USB PRO removed.


Help will be appreciated..



#2 CLaeR

CLaeR

    X-S Young Member

  • Members
  • Pip
  • 34 posts
  • Location:Russia
  • Interests:Xbox 360, Playstation 3, Fun
  • Xbox Version:unk
  • 360 version:v3.0 (falcon)

Posted 05 March 2012 - 09:29 PM

Click Start -> Run, Type regedit,  Press Enter, navigate to HKEY_CURRENT_USER and find Jungle flasher.
Right click and create there string value name it writekey and set value to 1.
Start latest JF. Click open target firmware and select 9504-orig.bin. Then click manual spoof and insert your dvd key from fat liteon. click ok, after it click right mouse button and select write key. now you can use ur drive or dump fimware and flash any lt firmware to drive like normal.
pls don't post whole log just last part.

Edited by CLaeR, 05 March 2012 - 09:32 PM.


#3 OggyUK

OggyUK

    X-S Freak

  • Last Chance
  • PipPipPipPipPip
  • 1,876 posts
  • Location:Northants, UK
  • Xbox Version:unk
  • 360 version:unknown

Posted 09 March 2012 - 02:23 AM

Still wont have the correct key sector.

#4 bluemimmosa

bluemimmosa

    X-S Member

  • Members
  • Pip
  • 64 posts
  • Xbox Version:unk
  • 360 version:v3.0 (falcon)

Posted 13 March 2012 - 10:54 AM

hello, glitched a xbox360 slim that came to my hand without the dvd drive. The customer wants to put a new drive and i have it. now i found dvd key from xell and want to inject it to the drive, but after that the drives says authorization failed. Can anyone guide me on how can i make the drive able to play games, bcoz every discs gives me play DVD error. The log from the jungle flasher is below:

QUOTE
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
JungleFlasher 0.1.92 Beta (304)
Session Started Tue Mar 13 14:18:33 2012

This is a 32 bit process running on a 32 bit CPU
X360USB PRO detected, Version 0.18

Found 1 I/O Ports.
Found 1 Com Ports.
Found 2 windows drives C: D:
Found 0 CD/DVD drives

Loading firmware file C:\Documents and Settings\Admin\Desktop\JungleFlasher v0.1.92 Beta (304)\firmware\LTPlus-0272-v3.0.bin
MD5 hash: 76b991307ddd5b2af581d0608e671b36
Genuine LT plus v3.0
Drive key @ n/a FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
Firmware Osig: [PLDS DG-16D4S 0272]
Firmware is: LT-Plus 3.0
DVD Key copied to target
Target is LT - ID strings not copied to Target
Stage 1, Complete!
Stage 2, Complete!
Done!
Drive is Slim Lite-On..
Drive is Slim Lite-On..


0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS
0010: 44 47 2D 31 36 44 34 53 - 20 20 20 20 20 20 20 20 DG-16D4S
0020: 39 35 30 34 00 00 00 00 - 00 00 00 00 00 00 00 00 9504............
0030: 00 00 00 00 41 30 41 30 - 00 00 00 00 00 00 00 00 ....A0A0........
0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0060: 44 37 31 31 43 47 30 32 - 37 39 31 32 30 30 36 4A D711CG027912006J
0070: 41 00 00 00 A...

Sending Password to Drive on port 0x0000
Done!
Sending Vendor Intro to port 0x0000

Serial flash found with Status 0x72

Sending Device ID request to port 0x0000
Manufacturer ID: 0xC2
Device ID: 0x11
Flash Name: MXIC(MX25L2005)
Flash Size: 262144 bytes

Getting Status from port 0x0000
SPi flash found with Status 0x72

Sending Chip Erase to Port 0x0000
Erasing:
Writing target buffer to flash
Writing Bank 0: ................
Writing Bank 1: ................
Writing Bank 2: ................
Writing Bank 3: ................
............
Flash Verification Test !
Reading Bank 0: ................
Reading Bank 1: ................
Reading Bank 2: ................
Reading Bank 3: ................
Dumped in 6098mS

Write verified OK !

Restoring sector 0x3E000.

Sending Sector Erase to Port 0x0000
Erasing: 0x3E000
Writing: 0x3E000
............
Authorisation Failed!
Restore Verify Failed !


And the console had a 9504 drive according to the nand. So anyone can guide me how can i make it play games from discs. I had the console already glitched..

Now since there is authorization failed, i think the key is not written on the 360 drive. Can anyone help me on this how can i sucessfully inject the dvd key. I already tried injecting with JF by using WriteKey but it fails on authorization.


#5 hangover

hangover

    X-S Expert

  • Members
  • PipPipPip
  • 675 posts
  • Location:Melbourne, Australia
  • Xbox Version:v1.4
  • 360 version:v4.0 (jasper)

Posted 14 March 2012 - 12:29 PM

I think you'll have to buy an unlocked 9504 pcb to be able to flash the dvd key/cfw to it or possibly the drill hack.

#6 bluemimmosa

bluemimmosa

    X-S Member

  • Members
  • Pip
  • 64 posts
  • Xbox Version:unk
  • 360 version:v3.0 (falcon)

Posted 14 March 2012 - 01:49 PM

QUOTE(hangover @ Mar 14 2012, 04:59 PM) View Post

I think you'll have to buy an unlocked 9504 pcb to be able to flash the dvd key/cfw to it or possibly the drill hack.


I have a unlocked 9504 drive at hand, and when i try to write the fw it always fails at authorization. so what do u think i am missing.

#7 Antman1

Antman1

    X-S Freak

  • Members
  • PipPipPipPipPip
  • 1,227 posts
  • Xbox Version:v1.0
  • 360 version:v3.0 (falcon)

Posted 14 March 2012 - 04:39 PM

I did the same thing you are doing and what I had to do is use a key.bin file I had from another drive backup and I hex edited the key into it. then I used the manual spoof option in Jungleflasher to select the key.bin I made and made the cfw then flashed it without changing the model of the drive. then I used the KV Editor and edited the KV so that it would have the model of drive I was using then I placed the KV.bin file with my nanddump.bin file and cpukey.txt file and used 360 Multi Builder v0.82 to create my new image. I then flashed it to my console and poof. all was good. the guide is on my site to do a RGH and it shows this info towards the bottom of the guide. my site is heavenlymodz.com

#8 dasjones

dasjones

    X-S Young Member

  • Members
  • Pip
  • 34 posts
  • Xbox Version:v1.6
  • 360 version:v5.0 (360S - trinity)

Posted 22 April 2012 - 03:12 PM

Download lizard toolbox
Go to "CFW Generator" tab
Go to "Advanced View" Subtab
In Destination / Target firmware, load fw
Load the "LTPlus-0272-v3.0.bin" from the jungleflasher firmware folder
Click the ... on the right of the "Key" line (fffff...)
Select "allow me to type a value"
Insert your key.
Cfw Save as (Answer yes twice and save the key
On jungle load this generated cfw as target fw
confirm is the right key
write it in your drive (yes to not spoofed)
Should work.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users