Welcome to our community

Be apart of something great, join today!

just a few questions -liteon/extactor/ iXtreme

Many of my greatest mods have been after a night of Stella's.

Its my inspiration.
 
very ture...lol.. seen some bricks as well like when the wrong firmware has been sent.... right last question if i may dear fellow DW members...

JF goes on about com ports and yet i haven't got it rigged up to a com port, do i need that as well as the USB connection?

i thank you.
 
USB is USB2Serial (aka virtual com port)

You need for for LiteOn key extraction, thats all
 
kk like a usbjtag....ok 1st hurdle, can't select usb extrator in JF it's grayed out.....

51918022.jpg
 
Last edited:
kk thanks....

new error...even with green light on probe....

baddata.jpg



i'm using the usb as prev posted, i'm sure since i dont have the above then i will need it plugged in the com port via a null modem cable.....must be this....?


edit of course...ok read the key, but when asked to load ixtreme i got new error.....

newerrorr.jpg
 
Last edited by a moderator:
i'm using com one....

here's the log mate....





~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

JungleFlasher 0.1.60 Beta

Session Started Sat Jun 06 21:11:46 2009




This is a 32 bit process running on a 32 bit CPU

PortIO is installed and running.

Found 4 I/O Ports.

Found 2 Com Ports.

Found 3 windows drives.

Found 1 CD/DVD drives.



Sending DVDKey request to I/O port 0x1860 and COM1



................ Serial Data looks ok, key returned: F92A4443690321C124ED3DF23F8820E7

................ Serial Data looks ok, key returned: F92A4443690321C124ED3DF23F8820E7

................ Serial Data looks ok, key returned: F92A4443690321C124ED3DF23F8820E7

................ Serial Data looks ok, key returned: F92A4443690321C124ED3DF23F8820E7

................ Serial Data looks ok, key returned: F92A4443690321C124ED3DF23F8820E7

................ Serial Data looks ok, key returned: F92A4443690321C124ED3DF23F8820E7



Extracted drive key matched 6 times.

Key data saved to C:\Documents and Settings\Mowax\Desktop\XBOX360 FLASHING\liteon\Key.bin






Inquiry String saved to C:\Documents and Settings\Mowax\Desktop\XBOX360 FLASHING\liteon\Inquiry.bin







Dummy.bin file saved to C:\Documents and Settings\Mowax\Desktop\XBOX360 FLASHING\liteon\Dummy.bin



Loading DVDkey source file

Inquiry string found

Identify string found

DVD key found @ 0xA030 key is F92A4443690321C124ED3DF23F8820E7

Firmware is a Lite-On Dummy OSIG: PLDS DG-16D2S 7485

Firmware type is: DVDKey32 extract



Auto-
 
Last edited:
Sorry? Why did you post the og?

Load iX1.6, spoof source to target, then proceed with erase / write.
 
thanks man, do you think it could be because i saved the dumps some where other than where jf wanted to save them?
 
if your worried
redump to where jf wants to and compare

if they match the you know ur safe :)
 
cant u just change back to save in the original place ?


also why where here ,, do u only use the probe once just to just the dummy key ? then u dont need to use again ? cheers ,, sorry to just jump in there
 
hi mate OK turns out that the new 1.6 isn't named correctly so you have to click no to that message then load the target firmware and then spoof it, then go to save and save your new .bin file that has been spoofed then carry on with jf mtk flash! bloody name of the new file is all it is...

yeah you only use the probe to get the orginal keys and that from the box after that it's all then flashed via your sata card
 
Back
Top