How to flash A IBM ServeRaid BR10i RAID Controller to LSI SAS 1068E firmware (IT)

01-br10i-ports Just a small how to on I how I flashed my IBM BR10i to a LSI SAS 1068E(B3) making it a simple HBA card running in IT mode.
IT Firmware = Straight pass through with no RAID options
IR Firmware= Pass through as in IT mode, but you also have RAID options.
I’m using IT firmware so that the disks can be controlled by the OS instead of the RAID features of the card which is what I wanted.

I flashed the firmware from inside a Windows 2008 R2 machine.

1) Download the firmware file from here (source I got it from is here)

2) Extract the archive and then proceed with a command prompt which you should run as an administrator.

3) Go to the directory and start the 1_ListAllAdaptors_x64.bat
This command will show us what LSI cards we have available:

.
.     List information about all adapters found

Press any key to continue . . .

.     Proceeding to find LSI Controllers
.     Log Adaptors.txt in the current directory

****************************************************************************
    LSI Corporation SAS FLASH Utility.

    SASFlash Version 1.30.00.00 (2011.08.24)

    Copyright (c) 2006-2011 LSI Corporation. All rights reserved.
****************************************************************************

        Adapter Selected is a LSI SAS 1068E(B3):

Num   Ctlr      FW Ver     NVDATA   x86-BIOS     EFI-BSD    PCI Addr
———————————————————————–

1   1068E(B3)  01.30.10.00  2d.28  06.30.00.00  03.16.00.06  00:01:00:00

Finished Processing Commands Successfully.
        Exiting SASFlash.

4) Start 2_Backup_Current_Firmware_&_Bios_x64.bat to create a backup of the current firmware:

.     Your existing firmware will be saved as 1068E-FW-Backup.fw
.     Your existing BIOS will be saved as     1068E-Backup-BIOS.rom
.     in the current directory

Press any key to continue . . .

.     Saving old firmware and BIOS

****************************************************************************
    LSI Corporation SAS FLASH Utility.

    SASFlash Version 1.30.00.00 (2011.08.24)

    Copyright (c) 2006-2011 LSI Corporation. All rights reserved.
****************************************************************************

        Adapter Selected is a LSI SAS 1068E(B3):

        Executing Operation: Upload Firmware

        Upload Succesful!

Finished Processing Commands Successfully.
        Exiting SASFlash.

5) Now that the firmware is backed-up safely we can continue with flashing the BR10i to LSI IT Firmware by running 3_Flash_to_IT_mode_x64.bat

.     Using 3081E Board, PCIe HBA, Initator-Target (IT) firmware with chip B3

.  COMMANDLINE THAT WILL BE USED:
   sasflash -l Flashlog.txt -o -f 3081ETB3.fw -b MPTSAS.ROM

Press any key to continue . . .

.     Proceeding to Flash and Log too Flashlog.txt
.     in the current directory

****************************************************************************
    LSI Corporation SAS FLASH Utility.

    SASFlash Version 1.30.00.00 (2011.08.24)

    Copyright (c) 2006-2011 LSI Corporation. All rights reserved.
****************************************************************************

        Advanced Mode Set

        Adapter Selected is a LSI SAS 1068E(B3):

        Executing Operation: Flash Firmware Image

                Checksum Passed: 00000000

                Verifying NVDATA Compatibility. . .
                NVDATA Versions Compatible

                Product ID and Vendor ID do not match.
                Would you like to flash anyway [y/n]? y

                Valid BootLoader Image verified.

                Flashing IT Firmware over IR Firmware!
                Would you like to flash anyway [y/n]? y

                Beginning Firmware Download

                Firmware Download: SUCCESSFUL!

                Verifying the image flashed correctly. . .

                Firmware Flash: SUCCESSFUL!

                Resetting Adapter:
                Adapter Successfully reset.

        Executing Operation: Flash BIOS Image

                Validating BIOS Image. . .

                BIOS Header Signature Valid.

                Checksum Passed: 00000000

                BIOS Image compatible with the SAS Controller.

                Attempting to Flash BIOS Image. . .

                BIOS Flash: SUCCESSFUL!

Finished Processing Commands Successfully.
        Exiting SASFlash.

6) Just to be sure that everything has gone according to plan we do a verify of the process by running 4_ListAllAdaptorsAfterFlash_x64.bat:

.     List information about all adapters found

Press any key to continue . . .

.     Proceeding to find LSI Controllers
.     Log Adaptors.txt in the current directory

***********************************************************************
    LSI Corporation SAS FLASH Utility.

    SASFlash Version 1.30.00.00 (2011.08.24)

    Copyright (c) 2006-2011 LSI Corporation. All rights reserved.
***********************************************************************

        Adapter Selected is a LSI SAS 1068E(B3):

Num   Ctlr      FW Ver     NVDATA   x86-BIOS     EFI-BSD    PCI Addr
———————————————————————–

1   1068E(B3)  01.33.00.00  2d.03  06.36.00.00  03.16.00.06  00:01:00:00

Finished Processing Commands Successfully.
        Exiting SASFlash.

We have success…! Now we can reboot the machine and start using the BR10i as a LSI Card in IT Mode.

If this post helped you out, help me out keeping this site alive and visit some of my sponsors on the left or right.. Thanks..!
Tags:how to, flash IBM BR10i to LSI firmware

Experiment: Just how real is this WPA threat? (how to hack into your own WPA router using WPS and prevent others from doing so)

Last month I read the "Brute forcing Wi-Fi Protected Setup" document by Stefan Viehböck which explains a vulnerability in the WPS system which is a feature available in most modern wifi routers.
The flaw can be exploited using a tool called reaver which gives you the ultra-secure wpa password of your Wireless Network after it brute forces the WPS system. [simplified explanation in n00b terms]
The document lit a small spark in my mind wondering how hard it actually would be to "exploit" this weakness for a hacker with barely any experience [which would be me 🙂 ]. So I grabbed some gear and did a quick experiment to find out…

Read more