Results 1 to 2 of 2

Thread: how to fix "fwrite(packet header/data) failed: No space left on device"

  1. #1
    Just burned his ISO
    Join Date
    Jan 2009
    Posts
    3

    Default how to fix "fwrite(packet header/data) failed: No space left on device"

    i got this "fwrite(packet header/data) failed: No space left on device" error when capturing packets. I looked it up on google and got information that it's about the memory space (which i heard it uses Ramdisk) to store my .cab file ran out.

    can anyone help me what's the command to direct my .cab file to another memory like harddisk or flash drive?

    i'm very new to BT3 and don't have background knowledge of Linux, so please give me an example of the whole command syntax, coz' if you guys give me only the command itself alone then I can't figure out where is the right place to put it

    i guess it must be some additional command to put in the Airodump-ng command, is that right?

    like.....
    airodump-ng -c 6 -[should be more command about directory here?]w darika --bssid 00:11:22:33:44:55 eth1

  2. #2
    Junior Member
    Join Date
    Mar 2010
    Posts
    44

    Default

    Hi, use mv;
    bt3~#mv file.cab /mnt/sda2/home/john or wherever.
    If you have windows, BT3 automounts it, this command will tell you where;
    bt3~#mount
    Here's mine;
    aufs on / type aufs (rw)
    proc on /proc type proc (rw)
    sysfs on /sys type sysfs (rw)
    usbfs on /proc/bus/usb type usbfs (rw)
    /dev/sda2 on /mnt/sda2 type ext3 (rw,noatime)
    /dev/sda3 on /mnt/sda3 type ext3 (rw,noatime)
    /dev/sda5 on /mnt/sda5 type ext3 (rw,noatime)
    /dev/sdb1 on /mnt/sdb1 type vfat (rw,noatime,quiet,umask=0,check=s,shortname=mixed)
    Sda1-3 and 5 are the scuzzy drives, yours may be hda instead (sdb1 is a usb key)

    If for some reason, it is not automounted make a directory to mount it at
    bt3~#mkdir /mnt/win

    Then mount the drive;
    bt3~#mount /dev/sda3 /mnt/win
    You should be able to use mv now.
    These programs all have manuals, to read them type;
    bt3~#man mv
    bt3~#man mount
    bt3~#man mkdir
    The manual program has it's own man page;
    bt3~#man man
    Some other useful programs;
    bt3~#man ls
    bt3~#man cd
    bt3~#man cp
    bt3~#man rm (careful, use only with the -i switch bt3~#rm -i)
    The command interpreter, bash has it' own manual too
    bt3~#man bash
    Try this;
    bt3~#ls /usr/bin
    The results are programs. Not all programs have manuals, but usually typing the program name with the -h (or --help) switch will give you help, ie;
    bt3~#aircrack-ng --help
    Aircrack-ng 1.0 rc1 r1085 - (C) 2006,2007,2008 Thomas d'Otreppe
    Original work: Christophe Devine


    usage: aircrack-ng [options] <.cap / .ivs file(s)>

    Common options:

    -a <amode> : force attack mode (1/WEP, 2/WPA-PSK)
    -e <essid> : target selection: network identifier
    -b <bssid> : target selection: access point's MAC
    -p <nbcpu> : # of CPU to use (by default, all CPUs)
    -q : enable quiet mode (no status output)
    -C <macs> : merge the given APs to a virtual one

    Static WEP cracking options:

    -c : search alpha-numeric characters only
    -t : search binary coded decimal chr only
    -h : search the numeric key for Fritz!BOX
    -d <mask> : use masking of the key (A1:XX:CF:YY)
    -m <maddr> : MAC address to filter usable packets
    -n <nbits> : WEP key length : 64/128/152/256/512
    -i <index> : WEP key index (1 to 4), default: any
    -f <fudge> : bruteforce fudge factor, default: 2
    -k <korek> : disable one attack method (1 to 17)
    -x or -x0 : disable bruteforce for last keybytes
    -x1 : last keybyte bruteforcing (default)
    -x2 : enable last 2 keybytes bruteforcing
    -X : disable bruteforce multithreading (SMP only)
    -y : experimental single bruteforce mode
    -K : use only old KoreK attacks (pre-PTW)
    -s : show the key in ASCII while cracking
    -M <num> : specify maximum number of IVs to use
    -D : WEP decloak, skips broken keystreams
    -P <num> : PTW debug: 1: disable Klein, 2: PTW
    -1 : run only 1 try to crack key with PTW

    WEP and WPA-PSK cracking options:

    -w <words> : give filename(s) of the dictionaries
    -r <DB> : path to airolib-ng database
    (Cannot be used with -w)

    --help : Displays this usage screen
    Assuming that you have booted from a cd or usb key without persistent changes, you can't hurt anything, (except your hard drive), so explore a little, (use bt3~#man cd directory) and remember that google is your friend. Cheers, Kurt
    P.S. To insure that you don't mess up your hard disk, unmount it from the file tree;
    bt3~#umount /mnt/sda

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •