Page 1 of 1

Sammy Spoofing Read Errors

Posted: Thu Dec 10, 2009 3:14 pm
by BaDNeWz
Hi All

I have just spoofed a Sammy MS28 to mimic a BenQ VAD6038 but when doing the final read of the flash I seem to be getting a number of x's within the dots which i am guessing isn't good ! :)

I have tried 3 times now with the same result, below is the logfile for refference & advice ?

I had to manually copy and paste serial as I hadn't saved the bin file just copied & pasted into a txt document ... but looking at logfile it still appears as 777777777777777777 ?

JungleFlasher 0.1.67 Beta

Session Started Thu Dec 10 18:35:09 2009



This is a 32 bit process running on a 32 bit CPU

PortIO is installed and running.

Found 4 I/O Ports.

Found 1 Com Ports.

Found 4 windows drives A: C: D: E:

Found 1 CD/DVD drives D:





Sending Sammy_Un_Lock to Drive on port 0xD8A0

Stage 1, Complete!

Stage 2, Complete!

Stage 3, Complete!

Done!

Sending Vendor Intro

Vendor Intro Failed



Getting Status from port 0xD8A0

Invalid Status 0x51

Sending Vendor Intro to port 0xD8A0

Status 0xD1

Re-sending Vendor Intro:

..........................

Parallel flash found with Status 0x70



Sending Device ID request to port 0xD8A0

Manufacturer ID: 0xBF

Device ID: 0xB6

Flash Name: SST(SST39SF020)

Flash Size: 262144 bytes



Loading Source File E:\360 Hacking\Peoples Firmware + Keys\Si's Console\Serial 313548474005\ORIGINAL BENQ VAD6038\BENQ-OFW.bin

Inquiry string found

Identify string found

DVD key found @ 0xE030 key is BC05CC73D4F2C...[Good Key]

Firmware is Benq OSIG: PBDS VAD6038-64930C

Firmware type is: Stock



Loading target file E:\360 Hacking\Flashing Utilities\JungleFlasher.0.1.67.Beta\JungleFlasher v0.1.67 Beta (50)\firmware\ix161-samsung.bin

Target File MD5 hash is: 9e8dfe99bf58395e9d5e5b838703297c

Genuine Sammy iXtreme 1.61 Final

Inquiry string found

Identify string found

DVD key found @ 0x40EC key is 77777777777777777777777777777777

Firmware is Samsung OSIG: TSSTcorpDVD-ROM TS-H943Ams28

Firmware type is: iXTREME1.61-12x-FINAL-TS-H493A



Spoofing Target

DVD Key copied to target

Inquiry string copied from Source to Target

Identify string copied from Source to Target

Target spoofed as: PBDS VAD6038-64930C



Getting Status from port 0xD8A0

Parallel flash found with Status 0x70

Writing target buffer to flash

Erasing Bank 0: ................

Writing Bank 0: ................

Erasing Bank 1: ................

Writing Bank 1: ................

Erasing Bank 2: ................

Writing Bank 2: ................

Erasing Bank 3: ................

Writing Bank 3: ................



Flash Verification Test !

Reading Bank 0: ....x............x

Reading Bank 1: ................

Reading Bank 2: .....x...........x

Reading Bank 3: ................

Write verified OK !



Sending Vendor Outro to port 0xD8A0




Can i re-flash in DOS ?? if so what is the best method as i have only had to use DOSflash once before when I had the renown freeze flashing a friends Liteon ! :)

Any tutorials or advice are welcomed with open arms ... hehehe

Thanks again

BaDNeWz :mrgreen:

Re: Sammy Spoofing Read Errors

Posted: Thu Dec 10, 2009 4:38 pm
by HaGGardSmurf
The drive should work fine. As far as I know the x is just a failure to read that sector, and it retries. Thats why you will notice bank 0 and 2 have 2 extra characters (the x's) and the same number of dots.

Your key is good... Its not all 7's the cfw by default is al 7's but you hit the spoof button, and the key was spoofed over.

Re: Sammy Spoofing Read Errors

Posted: Sat Dec 19, 2009 12:16 pm
by staningrimsby
Have you tried using I-prep instead of JF and see what that says ?????