./sqlmap.py -u http://www.yello.co.th/th/hot_item.php?cat1=mechandise
    sqlmap/0.9-dev - automatic SQL injection and database takeover tool    
http://sqlmap.sourceforge.net
[*] starting at: 22:44:04
[22:44:04] [INFO] using 
'/pentest/database/sqlmap/output/www.yello.co.th/session' as session 
file[22:44:04] [INFO] testing connection to the target url
[22:44:05] [ERROR] unhandled exception in sqlmap/0.9-dev, please copy the 
command line and the following text and send by e-mail to 
sqlmap-users@lists.sourceforge.net. The developer will fix it as soon as 
possible:sqlmap version: 0.9-devPython version: 2.5.2Operating system: 
posixTraceback (most recent call last):  File "./sqlmap.py", line 89, in main   
 start()  File "/pentest/database/sqlmap/lib/controller/controller.py", line 
154, in start    if not checkConnection() or not checkString() or not 
checkRegexp():  File "/pentest/database/sqlmap/lib/controller/checks.py", line 
395, in checkConnection    page, _ = Request.getPage()  File 
"/pentest/database/sqlmap/lib/request/connect.py", line 192, in getPage    page 
= decodePage(page, responseHeaders.get("Content-Encoding"), 
responseHeaders.get("Content-Type"))  File 
"/pentest/database/sqlmap/lib/request/basic.py", line 107, in decodePage    
page = unicode(page, contentType.split('charset=')[-1])     #don't use 
getUnicode here. it needs to stay as is.LookupError: unknown encoding: 
windows-874
[*] shutting down at: 22:44:05
                                          
------------------------------------------------------------------------------
Simplify data backup and recovery for your virtual environment with vRanger. 
Installation's a snap, and flexible recovery options mean your data is safe,
secure and there when you need it. Data protection magic?
Nope - It's vRanger. Get your free trial download today. 
http://p.sf.net/sfu/quest-sfdev2dev
_______________________________________________
sqlmap-users mailing list
sqlmap-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/sqlmap-users

Reply via email to