sqlmap version: 1.0-dev (r5112) Python version: 2.6.6 Operating system: posix Command line: sqlmap.py --url ********************************************************************************************************************************************************************************* -D ************* --thread=10 -T ********* --dump --random-agent Technique: UNION Back-end DBMS: MySQL (fingerprinted) Traceback (most recent call last): File "/root/sqlmap/_sqlmap.py", line 81, in main start() File "/root/sqlmap/lib/controller/controller.py", line 573, in start action() File "/root/sqlmap/lib/controller/action.py", line 109, in action conf.dbmsHandler.dumpTable() File "/root/sqlmap/plugins/generic/enumeration.py", line 1635, in dumpTable for entry in entries: File "/root/sqlmap/lib/core/bigarray.py", line 90, in __iter__ yield self[i] File "/root/sqlmap/lib/core/bigarray.py", line 71, in __getitem__ self._checkcache(index) File "/root/sqlmap/lib/core/bigarray.py", line 62, in _checkcache self.cache = (index, pickle.load(fp), False) File "/usr/lib/python2.6/pickle.py", line 1370, in load return Unpickler(file).load() File "/usr/lib/python2.6/pickle.py", line 858, in load dispatch[key](self) File "/usr/lib/python2.6/pickle.py", line 1165, in load_put self.memo[self.readline()[:-1]] = self.stack[-1] MemoryError
[*] shutting down at 23:10:30 ------------------------------------------------------------------------------ Live Security Virtual Conference Exclusive live event will cover all the ways today's security and threat landscape has changed and how IT managers can respond. Discussions will include endpoint security, mobile security and the latest in malware threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/ _______________________________________________ sqlmap-users mailing list sqlmap-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/sqlmap-users