This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Project Information:Sqlibench"
From OWASP
Line 13: | Line 13: | ||
| style="width:14%; background:#cccccc" align="center"|[mailto:[email protected] '''Project Mailing List'''] | | style="width:14%; background:#cccccc" align="center"|[mailto:[email protected] '''Project Mailing List'''] | ||
| style="width:14%; background:#cccccc" align="center"|First Reviewer<br>[mailto:ferruh(at)mavituna.com '''Ferruh Mavituna'''] | | style="width:14%; background:#cccccc" align="center"|First Reviewer<br>[mailto:ferruh(at)mavituna.com '''Ferruh Mavituna'''] | ||
− | | style="width:14%; background:#cccccc" align="center"|Second Reviewer<br>[mailto:KFuller(at)DMV.CA.gov '''Kevin Fuller'''] <br/> | + | <br/> [[Project Information:Sqlibench:Ferruh|background info]] |
+ | | style="width:14%; background:#cccccc" align="center"|Second Reviewer<br>[mailto:KFuller(at)DMV.CA.gov '''Kevin Fuller'''] <br/> [[Project Information:Sqlibench:Kevin|background info]] | ||
| style="width:15%; background:#cccccc" align="center"|OWASP Board Member<br>(if applicable)<br>[mailto:name(at)name '''Name&Email'''] | | style="width:15%; background:#cccccc" align="center"|OWASP Board Member<br>(if applicable)<br>[mailto:name(at)name '''Name&Email'''] | ||
|} | |} |
Revision as of 18:24, 10 June 2008
PROJECT IDENTIFICATION | ||||||
---|---|---|---|---|---|---|
Project Name | SQLiBENCH | |||||
Short Project Description | SQLiBENCH is a benchmarking project of automatic sql injectors related to dumping databases. There're a lot of and great open source tools (takeover/dumpers/hybrid) for taking advantage of an sql injection vulnerability both used by web application security specialists and attackers. Techniques used, databases supported, algorithms employed and abilities implemented by these "sql injectors" greatly varies. It should be important to standardize general vulnerability techniques exists in web applications and one of the biggest one is sql manipulation. In our effort, we aim to produce a standardization of techniques used in exploiting sql injection by automatic tools. | |||||
Email Contacts | Project Leaders Bedirhan Urgun |
Project Contributors Mesut Timur |
Project Mailing List | First Reviewer Ferruh Mavituna |
Second Reviewer Kevin Fuller background info |
OWASP Board Member (if applicable) Name&Email |
PROJECT MAIN LINKS | |||||
---|---|---|---|---|---|
|
SPONSORS & GUIDELINES | |||||
---|---|---|---|---|---|
Sponsor - OWASP Summer of Code 2008 | Sponsored Project/Guidelines/Roadmap |
ASSESSMENT AND REVIEW PROCESS | ||||
---|---|---|---|---|
Review/Reviewer | Author's Self Evaluation (applicable for Alpha Quality & further) |
First Reviewer (applicable for Alpha Quality & further) |
Second Reviewer (applicable for Beta Quality & further) |
OWASP Board Member (applicable just for Release Quality) |
50% Review | Objectives & Deliveries reached? Yes/No (To update) --------- See&Edit: 50% Review/Self-Evaluation (A) |
Objectives & Deliveries reached? Yes/No (To update) --------- See&Edit: 50% Review/1st Reviewer (C) |
Objectives & Deliveries reached? Yes/No (To update) --------- See&Edit: 50%Review/2nd Reviewer (E) |
X |
Final Review | Objectives & Deliveries reached? Yes/No (To update) --------- What status has been reached? Season of Code - (To update) --------- See&Edit: Final Review/SelfEvaluation (B) |
Objectives & Deliveries reached? Yes/No (To update) --------- What status has been reached? Season of Code - (To update) --------- See&Edit: Final Review/1st Reviewer (D) |
Objectives & Deliveries reached? Yes/No (To update) --------- What status has been reached? Season of Code - (To update) --------- See&Edit: Final Review/2nd Reviewer (F) |
Objectives & Deliveries reached? Yes/No (To update) --------- What status has been reached? Season of Code - (To update) --------- See/Edit: Final Review/Board Member (G) |