Allora, dopo 3 giorni sono riuscito a far partire xell reload su una jasper 256MB.
Partiamo dalla lettura della nand:
For 16mb nand: nandpro usb: -r16 2.bin
For 256/512 mb nand: nandpro usb: -r64 2.bin
Sulla jasper l' ECCglitchgenerator non funzionerà mai. Bisogna usare python e python crypto e patchare con uno script build.py creato da un utente di un forum tedesco (almeno credo che l'abbia creato lui) che permette l'avvio di xell in 2/5 secondi (testato da me) mentre lo script nel pacchetto reset-glitch-hack-v1.0 ci mette intorno ai 30 secondi.
Altro errore, sulle fat non bisogna assolutamente rimuovere R2 e ponticellare R2 con R1 ma bisogna semplicemennte rimuovere R2 e chiudere con una goccia di stagno i 2 pad di R3
Guardate cosa dice GliGli sul readme (parti in grassetto):
Per la slim invece bisogna ponticellare.Codice:2- Basic procedure for fat 360s (zephyr, jasper) 2.1- Program the CPLD using Xilinx Impact, a CPLD programmer of your choice and the JED file for your 360 hardware revision. 2.2- Wire your 360 using the schematics and pictures located in /fat/wiring - If you are using a CMOD board, don't forget to remove R2 and short R3 on it. - Wire ground with thicker wire. 2.3- Build the NAND image, eg for a jasper the command should be something like: python common\imgbuild\build.py original_nand.ecc common\cdxell\CDjasper common\xell\xell-gggggg.bin (You need to dump your NAND prior to that) (If you don't have a jasper, you'll need a copy of a stock plaintext jasper SMC (v2.3) ) 2.4- Flash the resulting output\image_00000000.ecc using the NandPro +w command. 3- Basic procedure for slim 360s (trinity) 3.1- Program the CPLD using Xilinx Impact, a CPLD programmer of your choice and the JED file for your 360 hardware revision. 3.2- Wire your 360 using the schematics and pictures located in /slim/wiring. - If you are using a CMOD board, don't forget to remove R2 connect upper pad of R2 to lower pad of R1 on the CMOD. - Wire ground with thicker wire. 3.3- Build the NAND image, eg the command should be something like: python common\imgbuild\build.py original_nand.ecc common\cdxell\CD common\xell\xell-gggggg.bin (You need to dump your NAND prior to that) 3.4- Flash the resulting output\image_00000000.ecc using the NandPro +w command. 4- Enjoy your hacked 360 =) 5- Credits: GliGli, Tiros: Reverse engineering and hack development. cOz: Reverse engineering, beta testing. Razkar, tuxuser: beta testing. cjak, Redline99, SeventhSon, tmbinc, anyone I forgot... : Prior reverse engineering and/or hacking work on the 360.
Spero di esservi stato di aiuto
Segnalibri