Re: [sqlmap-users] Password Cracking
Brought to you by:
inquisb
From: Bernardo D. A. G. <ber...@gm...> - 2011-07-12 20:45:34
|
Hi Olu, This should be fixed now. Can you please retry your run after an svn update and report back? Bernardo On 12 July 2011 14:47, Olu Akindeinde <sey...@gm...> wrote: > Hi guys, > I got this error from SQLMap when attempting to crack the hashes discovered > [14:44:17] [INFO] using hash method: 'md5_generic_passwd' > what dictionary do you want to use? > [1] default dictionary file (press Enter) > [2] custom dictionary file > [3] file with list of dictionary files >> > [14:44:18] [INFO] using default dictionary > [14:44:18] [INFO] loading dictionary from > '/Users/fx/sqlmap/txt/wordlist.txt' > do you want to use common password suffixes? (slow!) [y/N] n > [14:44:21] [INFO] starting dictionary attack (md5_generic_passwd) > [14:44:21] [INFO] starting 4 processes > [14:44:24] [INFO] current status: 104% (zoagi...) > [14:44:24] [CRITICAL] unhandled exception in sqlmap/1.0-dev (r4257), retry > your run with the latest development version from the Subversion repository. > If the exception persists, please send by e-mail to > sql...@li... the following text and any information > required to reproduce the bug. The developers will try to reproduce the bug, > fix it accordingly and get back to you. > sqlmap version: 1.0-dev (r4257) > Python version: 2.6.1 > Operating system: posix > Command line: ./sqlmap.py -u ******************************************** -v > 3 -D ********** -T ********* --dump --replicate --parse-errors --threads=10 > --level=3 --risk=3 > Technique: UNION > Back-end DBMS: MySQL (fingerprinted) > Traceback (most recent call last): > File "./sqlmap.py", line 86, in main > start() > File "/Users/fx/sqlmap/lib/controller/controller.py", line 554, in start > action() > File "/Users/fx/sqlmap/lib/controller/action.py", line 109, in action > conf.dbmsHandler.dumpTable() > File "/Users/fx/sqlmap/plugins/generic/enumeration.py", line 1742, in > dumpTable > attackDumpedTable() > File "/Users/fx/sqlmap/lib/utils/hash.py", line 290, in attackDumpedTable > results = dictionaryAttack(attack_dict) > File "/Users/fx/sqlmap/lib/utils/hash.py", line 583, in dictionaryAttack > results.extend([retVal.get() for i in xrange(retVal.qsize())] if retVal > else []) > File > "/System/Library/Frameworks/Python.framework/Versions/2.6/lib/python2.6/multiprocessing/queues.py", > line 113, in qsize > return self._maxsize - self._sem._semlock._get_value() > NotImplementedError > [*] shutting down at 14:44:24 > > Kind Regards, > Olu > > ------------------------------------------------------------------------------ > All of the data generated in your IT infrastructure is seriously valuable. > Why? It contains a definitive record of application performance, security > threats, fraudulent activity, and more. Splunk takes this data and makes > sense of it. IT sense. And common sense. > http://p.sf.net/sfu/splunk-d2d-c2 > _______________________________________________ > sqlmap-users mailing list > sql...@li... > https://lists.sourceforge.net/lists/listinfo/sqlmap-users > > -- Bernardo Damele A. G. E-mail / Jabber: bernardo.damele (at) gmail.com Mobile: +447788962949 (UK 07788962949) PGP Key ID: Unavailable |