Sammy Spoofing Read Errors
Posted: Thu Dec 10, 2009 3:14 pm
Hi All
I have just spoofed a Sammy MS28 to mimic a BenQ VAD6038 but when doing the final read of the flash I seem to be getting a number of x's within the dots which i am guessing isn't good !
I have tried 3 times now with the same result, below is the logfile for refference & advice ?
I had to manually copy and paste serial as I hadn't saved the bin file just copied & pasted into a txt document ... but looking at logfile it still appears as 777777777777777777 ?
JungleFlasher 0.1.67 Beta
Session Started Thu Dec 10 18:35:09 2009
This is a 32 bit process running on a 32 bit CPU
PortIO is installed and running.
Found 4 I/O Ports.
Found 1 Com Ports.
Found 4 windows drives A: C: D: E:
Found 1 CD/DVD drives D:
Sending Sammy_Un_Lock to Drive on port 0xD8A0
Stage 1, Complete!
Stage 2, Complete!
Stage 3, Complete!
Done!
Sending Vendor Intro
Vendor Intro Failed
Getting Status from port 0xD8A0
Invalid Status 0x51
Sending Vendor Intro to port 0xD8A0
Status 0xD1
Re-sending Vendor Intro:
..........................
Parallel flash found with Status 0x70
Sending Device ID request to port 0xD8A0
Manufacturer ID: 0xBF
Device ID: 0xB6
Flash Name: SST(SST39SF020)
Flash Size: 262144 bytes
Loading Source File E:\360 Hacking\Peoples Firmware + Keys\Si's Console\Serial 313548474005\ORIGINAL BENQ VAD6038\BENQ-OFW.bin
Inquiry string found
Identify string found
DVD key found @ 0xE030 key is BC05CC73D4F2C...[Good Key]
Firmware is Benq OSIG: PBDS VAD6038-64930C
Firmware type is: Stock
Loading target file E:\360 Hacking\Flashing Utilities\JungleFlasher.0.1.67.Beta\JungleFlasher v0.1.67 Beta (50)\firmware\ix161-samsung.bin
Target File MD5 hash is: 9e8dfe99bf58395e9d5e5b838703297c
Genuine Sammy iXtreme 1.61 Final
Inquiry string found
Identify string found
DVD key found @ 0x40EC key is 77777777777777777777777777777777
Firmware is Samsung OSIG: TSSTcorpDVD-ROM TS-H943Ams28
Firmware type is: iXTREME1.61-12x-FINAL-TS-H493A
Spoofing Target
DVD Key copied to target
Inquiry string copied from Source to Target
Identify string copied from Source to Target
Target spoofed as: PBDS VAD6038-64930C
Getting Status from port 0xD8A0
Parallel flash found with Status 0x70
Writing target buffer to flash
Erasing Bank 0: ................
Writing Bank 0: ................
Erasing Bank 1: ................
Writing Bank 1: ................
Erasing Bank 2: ................
Writing Bank 2: ................
Erasing Bank 3: ................
Writing Bank 3: ................
Flash Verification Test !
Reading Bank 0: ....x............x
Reading Bank 1: ................
Reading Bank 2: .....x...........x
Reading Bank 3: ................
Write verified OK !
Sending Vendor Outro to port 0xD8A0
Can i re-flash in DOS ?? if so what is the best method as i have only had to use DOSflash once before when I had the renown freeze flashing a friends Liteon !
Any tutorials or advice are welcomed with open arms ... hehehe
Thanks again
BaDNeWz
I have just spoofed a Sammy MS28 to mimic a BenQ VAD6038 but when doing the final read of the flash I seem to be getting a number of x's within the dots which i am guessing isn't good !

I have tried 3 times now with the same result, below is the logfile for refference & advice ?
I had to manually copy and paste serial as I hadn't saved the bin file just copied & pasted into a txt document ... but looking at logfile it still appears as 777777777777777777 ?
JungleFlasher 0.1.67 Beta
Session Started Thu Dec 10 18:35:09 2009
This is a 32 bit process running on a 32 bit CPU
PortIO is installed and running.
Found 4 I/O Ports.
Found 1 Com Ports.
Found 4 windows drives A: C: D: E:
Found 1 CD/DVD drives D:
Sending Sammy_Un_Lock to Drive on port 0xD8A0
Stage 1, Complete!
Stage 2, Complete!
Stage 3, Complete!
Done!
Sending Vendor Intro
Vendor Intro Failed
Getting Status from port 0xD8A0
Invalid Status 0x51
Sending Vendor Intro to port 0xD8A0
Status 0xD1
Re-sending Vendor Intro:
..........................
Parallel flash found with Status 0x70
Sending Device ID request to port 0xD8A0
Manufacturer ID: 0xBF
Device ID: 0xB6
Flash Name: SST(SST39SF020)
Flash Size: 262144 bytes
Loading Source File E:\360 Hacking\Peoples Firmware + Keys\Si's Console\Serial 313548474005\ORIGINAL BENQ VAD6038\BENQ-OFW.bin
Inquiry string found
Identify string found
DVD key found @ 0xE030 key is BC05CC73D4F2C...[Good Key]
Firmware is Benq OSIG: PBDS VAD6038-64930C
Firmware type is: Stock
Loading target file E:\360 Hacking\Flashing Utilities\JungleFlasher.0.1.67.Beta\JungleFlasher v0.1.67 Beta (50)\firmware\ix161-samsung.bin
Target File MD5 hash is: 9e8dfe99bf58395e9d5e5b838703297c
Genuine Sammy iXtreme 1.61 Final
Inquiry string found
Identify string found
DVD key found @ 0x40EC key is 77777777777777777777777777777777
Firmware is Samsung OSIG: TSSTcorpDVD-ROM TS-H943Ams28
Firmware type is: iXTREME1.61-12x-FINAL-TS-H493A
Spoofing Target
DVD Key copied to target
Inquiry string copied from Source to Target
Identify string copied from Source to Target
Target spoofed as: PBDS VAD6038-64930C
Getting Status from port 0xD8A0
Parallel flash found with Status 0x70
Writing target buffer to flash
Erasing Bank 0: ................
Writing Bank 0: ................
Erasing Bank 1: ................
Writing Bank 1: ................
Erasing Bank 2: ................
Writing Bank 2: ................
Erasing Bank 3: ................
Writing Bank 3: ................
Flash Verification Test !
Reading Bank 0: ....x............x
Reading Bank 1: ................
Reading Bank 2: .....x...........x
Reading Bank 3: ................
Write verified OK !
Sending Vendor Outro to port 0xD8A0
Can i re-flash in DOS ?? if so what is the best method as i have only had to use DOSflash once before when I had the renown freeze flashing a friends Liteon !

Any tutorials or advice are welcomed with open arms ... hehehe
Thanks again
BaDNeWz
