I wonder if this will be the final time I have to pay someone to flash my drive, I thought LT was supposed to be the last. I know nothing is for sure. I don't see anything else coming out that would have another change like kinect. Has anyone played their kinect backups yet?
Of course not. It's an ongoing battle. c4ve finds a chink in Microsoft's armor. Microsft finds a way to block c4ve's work. Then c4ve finds a way into Microsoft's new armor. Back and forth. It's easier today for a console manufacturer to fight because of the online updates/patches (some of which are mandatory). Just accept it as it is, and be happy somebody like c4ve is on your side.
Just Wondering if anyone has had issues witht he new flash? I was at 1.61 and attempted to go to LT+. When I did my Lite On 7 and all I got was play DVD when I went to test.....went to try again and my PC wont see the drive. Not sure what to do from here. Any suggestions? I have read forums and have not seen this yet. No matter what I try my PC can not see the drive now. Thanks Here is Log ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ JungleFlasher 0.1.55 Beta Session Started Tue Nov 23 22:28:36 2010 This is a 32 bit process running on 2 x 32 bit CPUs Found 4 I/O Ports. Found 0 Com Ports. Found 6 windows drives. Found 1 CD/DVD drives. Sending iXtreme DVDkey request to port 0xC800 Extracted drive key A64DCB57F2E2220CEB2FFC24DFCF28EC iXtreme v1.60-12x- Key data saved to C:\Users\\Desktop\XBOX\XBOX 360 Back Up Tools\CK3 Tools\Cams XBOX360 Lite On Original Key\Xtreme1.6 to LT+\Key.bin 0000: 05 80 00 32 5B 00 00 00 - 50 4C 44 53 20 20 20 20 ...2[...PLDS 0010: 44 47 2D 31 36 44 32 53 - 20 20 20 20 20 20 20 20 DG-16D2S 0020: 37 34 38 35 30 43 41 30 - 41 31 44 36 30 38 43 47 74850CA0A1D608CG 0030: 38 32 35 39 30 37 30 31 - 31 38 30 20 20 20 00 00 82590701180 .. 0040: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 0050: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ Inquiry String saved to C:\Users\Desktop\XBOX\XBOX 360 Back Up Tools\CK3 Tools\Cams XBOX360 Lite On Original Key\Xtreme1.6 to LT+\Inquiry.bin 0000: C0 85 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 0010: 00 00 00 00 44 36 30 38 - 43 47 38 32 35 39 30 37 ....D608CG825907 0020: 30 31 31 38 30 20 20 20 - 00 00 00 00 00 00 34 37 01180 ......47 0030: 35 38 43 30 20 20 4C 50 - 53 44 20 20 20 20 47 44 58C0 LPSD GD 0040: 31 2D 44 36 53 32 20 20 - 20 20 20 20 20 20 20 20 1-D6S2 0050: 20 20 20 20 20 20 20 20 - 20 20 20 20 20 20 00 00 .. 0060: 00 00 00 0B 00 00 00 04 - 00 02 06 00 00 00 00 00 ................ 0070: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 0080: 03 00 78 00 78 00 E3 00 - 78 00 00 00 00 00 00 00 ..x.x...x....... 0090: 00 00 00 00 00 00 00 00 - 02 02 00 00 68 00 00 00 ............h... 00A0: 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................ 00B0: 20 20 00 00 .. Identify String saved to C:\Users\Desktop\XBOX\XBOX 360 Back Up Tools\CK3 Tools\Cams XBOX360 Lite On Original Key\Xtreme1.6 to LT+\Identify.bin 0000: 44 36 30 38 43 47 38 32 - 35 39 30 37 30 31 31 38 D608CG8259070118 0010: 30 20 20 20 FF FF FF FF - 38 46 31 32 30 37 34 39 0 ....8F120749 0020: 31 37 41 36 31 34 58 58 - 41 30 FF FF 53 34 50 38 17A614XXA0..S4P8 0030: 36 31 39 30 30 30 30 30 - 30 30 35 30 32 31 00 00 61900000005021.. 0040: FF FF FF FF FF FF FF FF - FF FF FF FF 41 31 FF FF ............A1.. Dummy.bin file saved to C:\Users\Desktop\XBOX\XBOX 360 Back Up Tools\CK3 Tools\Cams XBOX360 Lite On Original Key\Xtreme1.6 to LT+\Dummy.bin Loading DVDkey source file Inquiry string found Identify string found DVD key found @ 0xA030 key is A64DCB57F2E2220CEB2FFC24DFCF28EC Firmware is a Lite-On Dummy OSIG: PLDS DG-16D2S 7485 Firmware type is: iXtreme v1.60-12x- Auto-Loading target file C:\Users\Desktop\XBOX\XBOX 360 Back Up Tools\JungleFlasher v0.1.55 Beta\firmware\LT+\LTPlus\LTPlus\LTPlus-748.bin Target File MD5 hash is: c95fc1cf2f6f35bf1b84ae546cf58b97 Inquiry area found Current DVD key is 3A20C64381A47D95D4B44C7B16ED961F Firmware is a Lite-On encrypted iXtreme OSIG: PLDS DG-16D2S 7485 Firmware type is: DVD Key copied to target Inquiry string copied from Source to Target Identify string copied from Source to Target Serial strings copied from Source to Target Target f/w saved as: C:\Users\Desktop\XBOX\XBOX 360 Back Up Tools\CK3 Tools\Cams XBOX360 Lite On Original Key\LT+ Hacked\Lite_CFW.bin Sending Lite-On-Erase request to port 0xC800 .............. Drive returned Status 0x0 .... Serial flash found with Status 0x72 Sending Vendor Outro to port 0xC800 Manufacturer ID: 0xC2 Device ID: 0x11 Flash Name: MXIC(MX25L2005) Flash Size: 262144 bytes Getting Status from port 0xC800 SPi flash found with Status 0x72 Sending Chip Erase to Port 0xC800 Writing target buffer to flash Writing Bank 0: ................ Writing Bank 1: ................ Writing Bank 2: ................ Writing Bank 3: ................ Flash Verification Test ! Reading Bank 0: ................ Reading Bank 1: ................ Reading Bank 2: ................ Reading Bank 3: ................ Write verified OK !
I have a benq vad6038 with fw62430cr spoofed as a hitachi cuz the hitachi drive was messed up. Can still use my benq spoofed as hitachi ? For LT+? Will it be safe to go online?
I originally had a Lite On, but now it's a BenQ, is this something M$ can detect, or do you think I'm ok because the drives are so similar? Not sure how that works.
hi guys, yeah my dashboard is still the old NXE one. Last time i turned on the xbox was on the 1st of november, and saw the update popup. Before then i don't remember updating for a LONG time. Am i screwed?
not at all, that xbox is JTAGable, whatever you do DO NOT UPDATE IT!! a JTAGed 360 can run unsigned code and play games right off the harddrive without discs.
Sending Lite-On-Erase request to port 0xC800 .............. Drive returned Status 0x0 .... Serial flash found with Status 0x72 Sending Vendor Outro to port 0xC800 Manufacturer ID: 0xC2 Device ID: 0x11 Flash Name: MXIC(MX25L2005) Flash Size: 262144 bytes Getting Status from port 0xC800 SPi flash found with Status 0x72 Sending Chip Erase to Port 0xC800 Writing target buffer to flash Writing Bank 0: ................ Writing Bank 1: ................ Writing Bank 2: ................ Writing Bank 3: ................ Flash Verification Test ! Reading Bank 0: ................ Reading Bank 1: ................ Reading Bank 2: ................ Reading Bank 3: ................ Write verified OK ! [/quote] outro ?[/quote] I guess I didn't Outro......Can I still? So drive is stuck in Vendor Mode? I hooked up and tried to Outro. It sent signal to port but still can't see drive with PC. Thanks
you're right, just found out that LT+ (maybe LT?) disabled the r707 probe. They're not useless though, you can still do the MRA method to get the key off them
new version of JF is released JungleFlasher.0.1.76.Beta.rar available on their site. google it please