László has more than 10 years experience in information security (penetration testing, security audit, incident response). As a researcher his focus is Oracle Database security. He published several research papers and tools in this subject. László is the developer of the woraauthbf tool, which was one of the fastest Oracle password crackers at the time of its release. He also released several unique research papers about vulnerabilities of the Oracle authentication protocols and post-exploitation techniques. His name was mentioned in several CPUs released by Oracle. You can check out the technical deepness of his presentations at www.soonerorlater.hu:
Well received presentation at Derbycon 2.0: Think differently about database hacking
http://soonerorlater.hu/index.khtml?article_id=517
Own research results on Oracle native authentication
http://www.soonerorlater.hu/index.khtml?article_id=511
First description of the Oracle native authentication protocol of Oracle 11g
http://www.soonerorlater.hu/index.khtml?article_id=512
Worauthbf which was the fastest oracle password bruteforcer at the time of the publishing
http://www.soonerorlater.hu/index.khtml?article_id=513
Own research results on Oralce authentication downgrading and publishing the tool pytnsproxy
http://www.soonerorlater.hu/index.khtml?article_id=514
Own research results on oracle post exploitation and TDE (Transparent Database Encryption)
http://www.soonerorlater.hu/index.khtml?article_id=516
Own research result on post exploitation of oracle and oradebug
http://www.soonerorlater.hu/download/hacktivity_lt_2011_en.pdf
What’s common in Oracle and Samsung? They tried to think differently about crypto.