sqlmap version: 1.0-dev (r5112)
Python version: 2.6.6
Operating system: posix
Command line: sqlmap.py --url
*********************************************************************************************************************************************************************************
-D ************* --thread=10 -T ********* --dump --random-agent
Technique: UNION
Back-end DBMS: MySQL (fingerprinted)
Traceback (most recent call last):
File "/root/sqlmap/_sqlmap.py", line 81, in main
start()
File "/root/sqlmap/lib/controller/controller.py", line 573, in start
action()
File "/root/sqlmap/lib/controller/action.py", line 109, in action
conf.dbmsHandler.dumpTable()
File "/root/sqlmap/plugins/generic/enumeration.py", line 1635, in dumpTable
for entry in entries:
File "/root/sqlmap/lib/core/bigarray.py", line 90, in __iter__
yield self[i]
File "/root/sqlmap/lib/core/bigarray.py", line 71, in __getitem__
self._checkcache(index)
File "/root/sqlmap/lib/core/bigarray.py", line 62, in _checkcache
self.cache = (index, pickle.load(fp), False)
File "/usr/lib/python2.6/pickle.py", line 1370, in load
return Unpickler(file).load()
File "/usr/lib/python2.6/pickle.py", line 858, in load
dispatch[key](self)
File "/usr/lib/python2.6/pickle.py", line 1165, in load_put
self.memo[self.readline()[:-1]] = self.stack[-1]
MemoryError
[*] shutting down at 23:10:30
------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and
threat landscape has changed and how IT managers can respond. Discussions
will include endpoint security, mobile security and the latest in malware
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
sqlmap-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/sqlmap-users