First I must say sorry for my lack of hex editing or hacking skill, but here goes.Differences between NET SS and Kev Memdump SS on Hitachi
Firstly I wanted to see what the SS.BIN looked like after I extracted it using Kevís Memdump (Seventh Sonís cool app Ė Hey Kev is that a reference to Maiden? Cool). So last night I opened it up within Hex Workshop and tried a simple search. This was after I hooked up my Hitachi drive using the Connectivity Kit and Windows Xp.
I entered the command C:\> memdump_win f 10200 8 8000 ram.bin - My hitachi was f drive
This dumped the forbidden ranges - I had heard they are the SS but not Xtreme compatible. And of cause there was a game in the drive which was Blazing Angels (PAL AUS Version). Once I had done that i opened the file in Hex Workshop and did what I only knew best - the find command.
I could believe how easy it was the find the hex. They do seem to be hidden around the whole Memdump SS.BIN file that was extracted. Some things did not match up but may be due to different SS timing or different SS regions. I used Blazing Angels PAL SS found from the net and still don't know what region it belonged to. I extracted my own SS.BIN file from my Hitachi and using Kev's cool program Memdump to get the SS key. This is what I've found so far.Xtreme Samsung NET SS
Offset 0 to 16 is E10F 3110 .... .... .... .... etc 339F which seems to be always used at the start of all Xtreme SS.BINMemdump Hitachi SS
The same 16 bytes hex (is that how you say it?) can be found at offset 220396 (0x00035CEC) of the Memdump SS from the Hitachi drive Xtreme Samsung NET SS
Offset 258 (0x000000102) is 0030 to 696F. The last 10 double figures are always different from SS to SS. The 0030 0000 06E0 is always the same.Memdump Hitachi SS
The same pattern can be found at offset 220654 (0x00035DEE)Xtreme Samsung Net SS
At offset 768 (0x000000300) is 0215 0000 followed by 144 little groups of quad figures e.g. 4234 3A45 etc, Sorry Iím really up to date with hex talk. The first 0215 0000 seems to always be the same from SS to SS.Memdump Hitachi SS
This same group is at offset 221164 (0x00035FEC) Xtreme Samsung Net SS
At offset 1120 are 8 groups of 4 which are always different from SS to SSMemdump Hitachi SS
Same offset is at 221516 (0x0003614C) which is 8 groups of 4 e.g. A8B3 6074 etcXtreme Samsung Net SS
At offset 1182 (0x00000049E) is 0400 (which is always the same) followed by 3 groups of 4 (always different) then 0100. Followed after the is 9 groups of 0000, then 8 groups of quad figures which always seem to be the same. To see how the difference are I used Blazing Angels and Fight Night SS and compared them to one another. Hex Workshop marks the differences in red so itís easy to see.Memdump Hitachi SS
The same is at offset 221578 (0x0003618A) and continues to 221622 (0x000361B6)
Now things start to heat upXtreme Samsung Net SS
At offset 1226 (0x0000004CA) is where the fun starts. It starts with a 01 and then after about 396 groups of quad hex the Net SS ends. Note I didnít count all of the quad figures as who wants to do that and it was late. It seems that with the Samsung SS there are 3 sections. Each section is roughly 144 hex groups. Again Iím sorry I donít know much about hex talk. After the first section there are 9 groups of 0000, then follows another group of hex. Then another 9 groups of 0000 leading to some more hex. The end of the Samsung SS is 9 groups of 0000. I recognize that it stops at 0800, well I can see 0000007EO on the side of Hex Workshop and that was the same when I was using DVDInfoPro to send the custom commands to my Pioneer (yes I know, read my first post and no I still havenít tried talking to that fish).Memdump Hitachi SS
So up to now things had been easy. Just search for the hex string. But now things were more complex. As I am a newbie all I know what to do was hex search. So I searched and found the first part at offset 221622 (0x000361B6)
Another portion was at offset 221926 (0x000362E6) which contained the whole last group of hex for the Samsung SS. The part was easy to see as it had FF FF FF FF before and after it. Some of the hex is different but that could be because of the SS timing issue or different region. I live in Australia and it can be hard to get the right region, mostly they are UK PAL and so far have wasted a few DVD+R DL. Only ones Iíve been able to backup have been Fight Night and Perfect Dark. (and now as of today Blazing Angels and Full Auto)
I havenít been able to find the middle section as of yet. It was late that I started writing this and had to go to sleep. But the other thing that I was going to do was use my backup copy (dvd+r dl) of Perfect Dark and extract the SS from the Hitachi using ĎMemdumpí and check with the SS that I used to back it up. It should be easier to find the entire hex that way. I hope so.
There is also a couple more things I need to find. Again tomorrow Iíll try with Perfect Dark and hopefully everything will be there. Iíll also extract the SS a few times to see if the Hitachi and Memdump extracts different SS of the same game like the Samsung Xtreme firmware does.
If anybody has had success or failure already let us know. Iíve seen on another forum that someone was trying something like this, some kind of extractor Hitachi program but it was in another language, All I could see was the sad smiley logo (
), though I donít think they were checking it with hex.
So what does this mean in the end? Well I guess maybe some one could write a cool little program to grab the hex out of a Memdump Hitachi SS dump and create a Xtreme working SS. If not Iíd rather cut and paste hex into a new SS that I know will work instead of wasting disc after disc with trail and error NET SS. I really canít import a Samsung drive into the country as it was going to cost me around $400AUS.
Another thing I noticed this morning was an old topic where Seventh Son had posted some memdumps. During 8002EC00_8003A300_360_game_B.dump BIN file there seemed to be the main part of the needed SS. I guess when I extracted the ranges Memdump extracted everything that was in the driveís RAM including those parts. Maybe we donít need to extract the whole range. I guess once we know what ranges to use, Memdump could extract those hex needed for the compatible Xtreme SS.
Also my backup of Blazing Angels with the Net SS worked no worries. Doesnít mean much except that it worked Ė the SS was PAL, so I guess AUS Blazing Angles doesnít have itís own AUS Pal SS. Note if the Hitachi is able to extract the SS using Memdump it will be good for everyone not just us Aussie. Iíve seen different SS for different parts of the PAL world like Spain, Italy, and Germany. At least if the burn doesnít work itís your burning media or burner not the SS that was found on the Net.
I should add how I got the SS from the Hitachi. It would not be possible without Kevís program Memdump. All of the details can be found from Kev site which is http://www.kev.nu/360/dvd.html
or here for the short version http://www.kev.nu/360/dvdshort.html
Quote from Kev.nu siteDumping the 'forbidden RAM ranges' 0x8002EC00-0x80037300 and 0x8003A000-0x8003A300
It turns out that these ranges contain very interesting information Again, the security measures to prevent software dumping of these ranges were a total failure. Use the following commnds to dump the entire contents of RAM, the 'forbidden' regions are at offsets 0x2EC00-0x37300 and 0x3A000-0x3A300 in the final dump.
$ ./memdump /dev/hdc 10200 8 8000 ./ram.bin
C:\> memdump_win e 10200 8 8000 ram.bin
Iíve read that these Ďforbidden Ram rangesí is the SS key, but at present is not compatible with the Xtreme firmware. I'll have a look tonight and see if anything can be found. Again I'm a newbie to this hacking scene.