How to spoof a Hitachi into any broken system.

Please only 360 guide here
Post Reply
mancougar
Peasant
Peasant
Posts: 19
Joined: Fri Mar 20, 2009 12:16 am

How to spoof a Hitachi into any broken system.

Post by mancougar »

How to spoof a Hitachi into any broken system.
Load up JF
Click Hitachi tab.
Press Mode B open disc tray press ok and then unlock by putting unlock 79 disc in the hitachi tray if needed
flash iextreme
flash key to the key of the benq or any xbox 360 drive
flash spoof and select the drive I did benq
your done here are the logs for any questions

JungleFlasher 0.1.62 Beta
Session Started Fri Jun 05 17:33:17 2009


This is a 32 bit process running on 2 x 32 bit CPUs
PortIO is installed and running.
Found 10 I/O Ports.
Found 1 Com Ports.
Found 3 windows drives C: D: F:
Found 1 CD/DVD drives D:


Drive, answers normal Windows Inquiry 12 0 0 0 24 0
0000: 05 80 00 32 2B 00 00 00 - 48 4C 2D 44 54 2D 53 54 ...2[...HL-DT-ST
0010: 44 26 64 2E 22 4F 4D 20 - 47 44 52 33 31 32 30 4C DVD-ROM GDR3120L
0020: 30 30 37 39 0079

Mode-B Done!
Scanning for hardware changes
Found drive C: - Hard Drive.
Found drive D: - CD/DVD.
Found drive F: - Hard Drive.
Found drive G: - CD/DVD. <--- Hitachi found
Tray Opening
Tray Closing
Playing 79Unlock Audio CD
Pausing 79Unlock Audio CD, after 550mS
Ejecting 79Unlock Audio CD
Setting bit 3 @ 0x5BD
Executing code in Ram
Done!
Tray Closing
Flashing Hacked f/w to Hitachi 0078/0079 by Ram Upload Method via WIN32 API
Dumping Flash:................................
Hitachi Dump file saved to C:\Documents and Settings\Tim\My Documents\myspoof\hit\New Folder\Hit-OFW.bin
Loading Hitachi Dump to Source Buffer
Inquiry string found
Identify string found
Firmware is rev 0079-4D20
DVD key found @ 0x4D20 key is 85FXXXXXXXXXXXXXXXXXXXXXXXXXXXXD51
Firmware is Hitachi OSIG: HL-DT-STDVD-ROM GDR3120L0079
Firmware type is: Stock

C:\Documents and Settings\Tim\Desktop\JungleFlasher v0.1.62 Beta

Drive is Stock, rev 0079
Auto-Loading target file C:\Documents and Settings\Tim\Desktop\JungleFlasher v0.1.62 Beta\firmware\ix151-79-4d20.bin
Target File MD5 hash is: 50f9031761514f85c3147f47031d1d03
Inquiry string found
Identify string found
Firmware is rev 0079-4D20
DVD key found @ 0x4D20 key is 00000000000000000000000000000000
Firmware is Hitachi OSIG: HL-DT-STDVD-ROM GDR3120L0079
Firmware type is: iXtreme:1.51:v79-12x
9 Sector Differences Found
Flash Stability Test
Flashing Sector 9003F000
Dumping Sector 9003F000:....
Read back & compare completed, Flashing Stable!
Repairing Test Sector.
Flashing Sector 9003F000
Done !
Flashing Sector 9003E000
Flashing Sector 90003000
Flashing Sector 90006000
Flashing Sector 9000A000
Flashing Sector 9001C000
Flashing Sector 9002B000
Flashing Sector 90031000
Flashing Sector 90034000
Flashing Sector 90035000
Done !
Write verify test..
Dumping Flash:................................
Read back & compare completed, Write Verified!
Flash Complete !
Flashing Keys to Hitachi 0078/0079 by Ram Upload Method via WIN32 API
Dumping Flash:................................
Hitachi Dump file saved to C:\Documents and Settings\Tim\My Documents\myspoof\hit\New Folder\New Folder\Hit-OFW.bin
Loading Hitachi Dump to Target Buffer
Inquiry string found
Identify string found
Firmware is rev 0079-4D20
DVD key found @ 0x4D20 key is 85FCE9xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
Firmware is Hitachi OSIG: HL-DT-STDVD-ROM GDR3120L0079
Firmware type is: iXtreme:1.51:v79-12x

Spoofing Target
DVD Key copied to target
Inquiry strings identical
Identify strings identical
1 Sector Differences Found
Flash Stability Test
Flashing Sector 9003F000
Dumping Sector 9003F000:....
Read back & compare, complete, Flashing Stable!
Repairing Test Sector.
Flashing Sector 9003F000
Done !
Flashing Sector 90004000
Done !
Write verify test..
Dumping Flash:....
Read back & compare, complete, Write Verified!
Flash Keys Complete !
Flashing Spoof ID's to Hitachi 0078/0079 by Ram Upload Method via WIN32 API
Dumping Flash:................................
Hitachi Dump file saved to C:\Documents and Settings\Tim\My Documents\myspoof\Hit-OFW.bin
Loading Hitachi Dump to Target Buffer
Inquiry string found
Identify string found
Firmware is rev 0079-4D20
DVD key found @ 0x4D20 key is 92Fxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
Firmware is Hitachi OSIG: HL-DT-STDVD-ROM GDR3120L0079
Firmware type is: iXtreme:1.51:v79-12x

Spoofing Target
DVD Keys are already the same
Inquiry string copied from Source to Target
Setting Master Checksum
Identify string copied from Source to Target
Target spoofed as: PBDS VAD6038-64930C
1 Sector Differences Found
Flash Stability Test
Flashing Sector 9003F000
Dumping Sector 9003F000:....
Read back & compare, complete, Flashing Stable!
Repairing Test Sector.
Flashing Sector 9003F000
Done !
Flashing Sector 9003C000
Done !
Write verify test..
Dumping Flash:............
Read back & compare, complete, Write Verified!
Flash ID Strings Complete !
Dumping f/w of Hitachi 0078/0079 by Ram Upload Method via WIN32 API
................................
Dumped in 1047mS

Hitachi Dump file saved to C:\Documents and Settings\Tim\My Documents\myspoof\flashed\Hit-OFW.bin
Loading Hitachi Dump to Source Buffer
Inquiry string found
Identify string found
Firmware is rev 0079-4D20
DVD key found @ 0x4D20 key is 92FXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
Firmware is Hitachi OSIG: HL-DT-STDVD-ROM GDR3120L0079
Firmware spoofed as: PBDS VAD6038-64930C
Firmware type is: iXtreme:1.51:v79-12x
Post Reply

Return to “Xbox360 guides go here”