Jump to content


Photo

Lite-on Dg-16d2s (74850c) Flash Problem?


  • Please log in to reply
4 replies to this topic

#1 X_Brolly_X

X_Brolly_X

    X-S Enthusiast

  • Members
  • 8 posts

Posted 07 September 2012 - 08:20 AM

After a few years of not having a 360 (2 consoles rrod after a few months) I purchased a used phat lite-on model at a great price. So I got caught up on the latest flashing techniques and went to work. Everything seemed to go smooth, but the drive won't read original disks or backups, it says to put the disk in a 360.

Here is the log from jungle flasher, I have no idea what went wrong.

Drive is Lite-On..
Sending Vendor Intro to port 0xE800
Status 0x51
Re-sending Vendor Intro:
....................
Serial flash found with Status 0x52

Extracted drive key passed Verification !

key returned: 976B20FC4405C67CFB1297E1074EE66B
Key data saved to C:\Users\Work\Desktop\JungleFlasher v0.1.92 Beta (304)\key.bin

0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS
0010: 44 47 2D 31 36 44 32 53 - 20 20 20 20 20 20 20 20 DG-16D2S
0020: 30 32 35 31 30 43 41 30 - 41 30 44 36 30 38 43 47 02510CA0A0D608CG
0030: 37 33 38 38 30 38 30 30 - 33 34 38 20 20 20 00 00 73880800348 ..
0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

Inquiry String saved to C:\Users\Work\Desktop\JungleFlasher v0.1.92 Beta (304)\Inquiry.bin

0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS
0010: 44 47 2D 31 36 44 32 53 - 20 20 20 20 20 20 20 20 DG-16D2S
0020: 30 32 35 31 30 43 20 20 - 00 00 00 00 00 00 00 00 02510C ........
0030: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0000: C0 85 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0010: 00 00 00 00 44 36 30 38 - 43 47 37 33 38 38 30 38 ....D608CG738808
0020: 30 30 33 34 38 20 20 20 - 00 00 00 00 00 00 32 30 00348 ......20
0030: 31 35 43 30 20 20 4C 50 - 53 44 20 20 20 20 47 44 15C0 LPSD GD
0040: 31 2D 44 36 53 32 20 20 - 20 20 20 20 20 20 20 20 1-D6S2
0050: 20 20 20 20 20 20 20 20 - 20 20 20 20 20 20 00 00 ..
0060: 00 00 00 0B 00 00 00 04 - 00 02 06 00 00 00 00 00 ................
0070: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0080: 03 00 78 00 78 00 E3 00 - 78 00 00 00 00 00 00 00 ..x.x...x.......
0090: 00 00 00 00 00 00 00 00 - 02 02 00 00 68 00 00 00 ............h...
00A0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00B0: 20 20 00 00 ..

Identify String saved to C:\Users\Work\Desktop\JungleFlasher v0.1.92 Beta (304)\Identify.bin

0000: 44 36 30 38 43 47 37 33 - 38 38 30 38 30 30 33 34 D608CG7388080034
0010: 38 20 20 20 FF FF FF FF - FF FF FF FF FF FF FF FF 8 ............
0020: FF FF FF FF FF FF FF FF - 41 30 FF FF FF FF FF FF ........A0......
0030: FF FF FF FF FF FF FF FF - FF FF FF FF FF FF FF FF ................
0040: FF FF FF FF FF FF FF FF - FF FF FF FF 41 30 FF FF ............A0..

Serial String saved to C:\Users\Work\Desktop\JungleFlasher v0.1.92 Beta (304)\Serial.bin


Dummy.bin file saved to Dummy.bin
Loading firmware from buffer
Inquiry string found
Identify string found
Drive key @ 0xA030 976B20FC4405C67CFB1297E1074EE66B
Firmware Osig: [PLDS DG-16D2S 0251]
Firmware is: PhatKey Extract
Key added to database

Loading firmware file C:\Users\Work\Desktop\JungleFlasher v0.1.92 Beta (304)\Dummy.bin
MD5 hash: dbccee4de20917cd0318f7f1cfbddbcc
Inquiry string found
Identify string found
Drive key @ 0xA030 976B20FC4405C67CFB1297E1074EE66B
Firmware Osig: [PLDS DG-16D2S 0251]
Firmware is: PhatKey Extract
Loading firmware file C:\Users\Work\Desktop\JungleFlasher v0.1.92 Beta (304)\firmware\LT-liteon-0800-v3.bin
MD5 hash: 777e8c2d89e0f57f891aa6735ed1cc95
Genuine Lite-On LT 0800 v3
Drive key @ n/a 55AA55AA55AA55AA55AA55AA55AA55AA
Firmware Osig: [PLDS DG-16D2S 7485]
Firmware is: LITEON-AP25V3.0 DG-16D2S
Spoofing Target
DVD Key copied to target
Inquiry string copied to Target
Identify string copied to Target
Serial data copied from Source to Target


Target f/w saved as: Lite_CFW.bin

Sending Lite-On-Erase request to port 0xE800
..............
Drive returned Status 0xD0
..................
Serial flash found with Status 0x72
Manufacturer ID: 0xC2
Device ID: 0x11
Flash Name: MXIC(MX25L2005)
Flash Size: 262144 bytes
Sending Vendor Intro to port 0xE800
Status 0xF2
Re-sending Vendor Intro:
....
Serial flash found with Status 0x72

Sending Device ID request to port 0xE800
Spi Status: 0x00
Manufacturer ID: 0xC2
Device ID: 0x11
Flash Name: MXIC(MX25L2005)
Flash Size: 262144 bytes

Getting Status from port 0xE800
SPi flash found with Status 0x72

Sending Chip Erase to Port 0xE800
Erasing:
Writing target buffer to flash
Writing Bank 0: ................
Writing Bank 1: ................
Writing Bank 2: ................
Writing Bank 3: ................

Flash Verification Test !
Reading Bank 0: ................
Reading Bank 1: ................
Reading Bank 2: ................
Reading Bank 3: ................
Write verified OK !

Sending Vendor Outro to port 0xE800
Drive is Lite-On..

Key found in KeyDB at record (1 - JungleFlasher v0.1.92 Beta (304))
Key is: 976B20FC4405C67CFB1297E1074EE66B
Key has been tested and verified, thanks C4eva !

#2 dougiegillam

dougiegillam

    X-S Senior Member

  • Members
  • PipPip
  • 218 posts
  • Location:North Wales.UK
  • Interests:Computing,cycling, running
  • Xbox Version:unk
  • 360 version:v5.0 (360S - trinity)

Posted 07 September 2012 - 09:41 AM

QUOTE(X_Brolly_X @ Sep 7 2012, 08:20 AM) View Post

After a few years of not having a 360 (2 consoles rrod after a few months) I purchased a used phat lite-on model at a great price. So I got caught up on the latest flashing techniques and went to work. Everything seemed to go smooth, but the drive won't read original disks or backups, it says to put the disk in a 360.

Here is the log from jungle flasher, I have no idea what went wrong.

Drive is Lite-On..
Sending Vendor Intro to port 0xE800
Status 0x51
Re-sending Vendor Intro:
....................
Serial flash found with Status 0x52

Extracted drive key passed Verification !

key returned: 976B20FC4405C67CFB1297E1074EE66B
Key data saved to C:\Users\Work\Desktop\JungleFlasher v0.1.92 Beta (304)\key.bin

0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS
0010: 44 47 2D 31 36 44 32 53 - 20 20 20 20 20 20 20 20 DG-16D2S
0020: 30 32 35 31 30 43 41 30 - 41 30 44 36 30 38 43 47 02510CA0A0D608CG
0030: 37 33 38 38 30 38 30 30 - 33 34 38 20 20 20 00 00 73880800348 ..
0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

Inquiry String saved to C:\Users\Work\Desktop\JungleFlasher v0.1.92 Beta (304)\Inquiry.bin

0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS
0010: 44 47 2D 31 36 44 32 53 - 20 20 20 20 20 20 20 20 DG-16D2S
0020: 30 32 35 31 30 43 20 20 - 00 00 00 00 00 00 00 00 02510C ........
0030: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0000: C0 85 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0010: 00 00 00 00 44 36 30 38 - 43 47 37 33 38 38 30 38 ....D608CG738808
0020: 30 30 33 34 38 20 20 20 - 00 00 00 00 00 00 32 30 00348 ......20
0030: 31 35 43 30 20 20 4C 50 - 53 44 20 20 20 20 47 44 15C0 LPSD GD
0040: 31 2D 44 36 53 32 20 20 - 20 20 20 20 20 20 20 20 1-D6S2
0050: 20 20 20 20 20 20 20 20 - 20 20 20 20 20 20 00 00 ..
0060: 00 00 00 0B 00 00 00 04 - 00 02 06 00 00 00 00 00 ................
0070: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0080: 03 00 78 00 78 00 E3 00 - 78 00 00 00 00 00 00 00 ..x.x...x.......
0090: 00 00 00 00 00 00 00 00 - 02 02 00 00 68 00 00 00 ............h...
00A0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00B0: 20 20 00 00 ..

Identify String saved to C:\Users\Work\Desktop\JungleFlasher v0.1.92 Beta (304)\Identify.bin

0000: 44 36 30 38 43 47 37 33 - 38 38 30 38 30 30 33 34 D608CG7388080034
0010: 38 20 20 20 FF FF FF FF - FF FF FF FF FF FF FF FF 8 ............
0020: FF FF FF FF FF FF FF FF - 41 30 FF FF FF FF FF FF ........A0......
0030: FF FF FF FF FF FF FF FF - FF FF FF FF FF FF FF FF ................
0040: FF FF FF FF FF FF FF FF - FF FF FF FF 41 30 FF FF ............A0..

Serial String saved to C:\Users\Work\Desktop\JungleFlasher v0.1.92 Beta (304)\Serial.bin
Dummy.bin file saved to Dummy.bin
Loading firmware from buffer
Inquiry string found
Identify string found
Drive key @ 0xA030 976B20FC4405C67CFB1297E1074EE66B
Firmware Osig: [PLDS DG-16D2S 0251]
Firmware is: PhatKey Extract
Key added to database

Loading firmware file C:\Users\Work\Desktop\JungleFlasher v0.1.92 Beta (304)\Dummy.bin
MD5 hash: dbccee4de20917cd0318f7f1cfbddbcc
Inquiry string found
Identify string found
Drive key @ 0xA030 976B20FC4405C67CFB1297E1074EE66B
Firmware Osig: [PLDS DG-16D2S 0251]
Firmware is: PhatKey Extract
Loading firmware file C:\Users\Work\Desktop\JungleFlasher v0.1.92 Beta (304)\firmware\LT-liteon-0800-v3.bin
MD5 hash: 777e8c2d89e0f57f891aa6735ed1cc95
Genuine Lite-On LT 0800 v3
Drive key @ n/a 55AA55AA55AA55AA55AA55AA55AA55AA
Firmware Osig: [PLDS DG-16D2S 7485]
Firmware is: LITEON-AP25V3.0 DG-16D2S
Spoofing Target
DVD Key copied to target
Inquiry string copied to Target
Identify string copied to Target
Serial data copied from Source to Target
Target f/w saved as: Lite_CFW.bin

Sending Lite-On-Erase request to port 0xE800
..............
Drive returned Status 0xD0
..................
Serial flash found with Status 0x72
Manufacturer ID: 0xC2
Device ID: 0x11
Flash Name: MXIC(MX25L2005)
Flash Size: 262144 bytes
Sending Vendor Intro to port 0xE800
Status 0xF2
Re-sending Vendor Intro:
....
Serial flash found with Status 0x72

Sending Device ID request to port 0xE800
Spi Status: 0x00
Manufacturer ID: 0xC2
Device ID: 0x11
Flash Name: MXIC(MX25L2005)
Flash Size: 262144 bytes

Getting Status from port 0xE800
SPi flash found with Status 0x72

Sending Chip Erase to Port 0xE800
Erasing:
Writing target buffer to flash
Writing Bank 0: ................
Writing Bank 1: ................
Writing Bank 2: ................
Writing Bank 3: ................

Flash Verification Test !
Reading Bank 0: ................
Reading Bank 1: ................
Reading Bank 2: ................
Reading Bank 3: ................
Write verified OK !

Sending Vendor Outro to port 0xE800
Drive is Lite-On..

Key found in KeyDB at record (1 - JungleFlasher v0.1.92 Beta (304))
Key is: 976B20FC4405C67CFB1297E1074EE66B
Key has been tested and verified, thanks C4eva !

Easy fix this as you used the wrong CFW file i.e you used 0800 firmware which has turned your liteon drive into an original backup drive. You should have used custom firmware file LTPlus-0251-v3.0. Suggest you download the LT 3.0 firmware again select the correct file and inject your key which you should have saved.

#3 X_Brolly_X

X_Brolly_X

    X-S Enthusiast

  • Members
  • 8 posts

Posted 07 September 2012 - 06:51 PM

That fixed it, thanks!

#4 dirty_denim86

dirty_denim86

    X-S Enthusiast

  • Members
  • 22 posts

Posted 12 September 2012 - 04:04 AM

I have the same drive and I am having some issues extracting the key with my probe...

Serial flash found with Status 0x52

after that I receive the PHATKEY extract complete pop up follow those instructions when I turn the system back on and click ok I receive "PHATKEY extract failed"

#5 boneym

boneym

    X-S Senior Member

  • Members
  • PipPip
  • 247 posts

Posted 12 September 2012 - 08:09 PM

phatkey extraction still NEEDS compatible sata,
the key is extracting over sata not through the probe.




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users