Backing Up, Modifying & Flashing the
Samsung Drive
&
How to Create Game Backups
&
Backing Up, Modifying & Flashing the
Hitachi/LG Drive
&
Bad Flash Recovery
Written by: Geebee & contributors
This post will be updated as I update the tutorial...
Changelog:
* Changed: crossed wires now recommends using a 1k resistor (MUCH safer) (v35)
* Added: f900 tutorial (v34)
* Added: v36 support (v33)
* Added: news section (v33)
* Fixed: Merged both tutorials (Hitachi and Samsung) (v33)
* Added: v59 stuff (v32-Hit)
* Removed: Hitachi, clevermod crap & password (v32-Sam and v32-Hit)
* Changed : watermark (v32-Sam and v32-Hit)
* Added: v46 info (v31)
* Changed: General typos (v31)
* Added: A huge watermark and pwd protect to prevent stealing (v30)
* Added: hdtv soft boot trick to boot backups (v29)
* Added: pic of which screws to undo (v28)
* EDITED: Thankyou list
corrected for scene people who deserve thanks only (v28)
* Added: HD Method to get backups to boot (v27)
* Added: Crossed Wires Pictures and expanded tutorial (v26)
* Added: Xecuter connectivity kit tutorial (v25)
* Update: IMPORTANT: This may give you an error message when flashing. Repeat the xtreme.bat file run until it is successful. DO NOT power off the drive until successful. (thanks Arakon) (v23)
* Added: fix if Hitachi cannot be seen in windows when in modeb (v22)
* This is just Hitachi
no samsung stuff (v20)
* Added the perfect way to open the 360 without damaging the case (v18)
* Added bookmarks (v17)
* Added hotswap method for getting Hitachi recognised in Windows (v17)
* General corrections (v17)
* v15: now covers how to make an SS with a Hitachi drive... (v15)
* added diagram for "crossed wires" connection and rewrite of method. (v13)
* added the crossed wires method of getting a Hitachi into modeB. (v12)
* updated for Helldocs SS Merger v1.4 (v11)
* Now in-cludes Sniperkillas Amendments: No need to remove DVD case for wxRipper; how to stop bad rips in wxRipper; reliable key editing with hexwotrkshop and more
* Few more bits added and now in PDF
Download Tutorial (v35 Toshiba-Samsung and Hitachi-LG guides):
here(pdf)When patching the f900.bin file according to this tutorial (extracting the SS using a Hitachi drive) in order for you to verify that your original dvd firmware has been encrypted, and patched correctly using ppf-o-matic, it tells you to decrypt the file and look at offset 3E7FC with a Hex editor to see if it's 00 00 00 00.
My question is how do you decrypt the file to look at it?.. I know that firmcrypt.exe encrypts the the file, but there's not one that decrypts it..