sqlmap version: 1.0-dev (r5112)
Python version: 2.6.6
Operating system: posix
Command line: sqlmap.py --url 
*********************************************************************************************************************************************************************************
 -D ************* --thread=10 -T ********* --dump --random-agent
Technique: UNION
Back-end DBMS: MySQL (fingerprinted)
Traceback (most recent call last):
  File "/root/sqlmap/_sqlmap.py", line 81, in main
    start()
  File "/root/sqlmap/lib/controller/controller.py", line 573, in start
    action()
  File "/root/sqlmap/lib/controller/action.py", line 109, in action
    conf.dbmsHandler.dumpTable()
  File "/root/sqlmap/plugins/generic/enumeration.py", line 1635, in dumpTable
    for entry in entries:
  File "/root/sqlmap/lib/core/bigarray.py", line 90, in __iter__
    yield self[i]
  File "/root/sqlmap/lib/core/bigarray.py", line 71, in __getitem__
    self._checkcache(index)
  File "/root/sqlmap/lib/core/bigarray.py", line 62, in _checkcache
    self.cache = (index, pickle.load(fp), False)
  File "/usr/lib/python2.6/pickle.py", line 1370, in load
    return Unpickler(file).load()
  File "/usr/lib/python2.6/pickle.py", line 858, in load
    dispatch[key](self)
  File "/usr/lib/python2.6/pickle.py", line 1165, in load_put
    self.memo[self.readline()[:-1]] = self.stack[-1]
MemoryError

[*] shutting down at 23:10:30


------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
sqlmap-users mailing list
sqlmap-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/sqlmap-users

Reply via email to