Paul's Security Weekly (Audio) When Public Payphones Become Smart Phones - Inbar Raz - PSW #855
7 snips
Dec 19, 2024 Inbar Raz, VP of Research at Zenity and retrocomputing enthusiast, dives into the security world of smart payphones. He reveals how attackers could exploit these devices, diving into VoIP vulnerabilities and AI's role in cybersecurity. The conversation takes a nostalgic turn as Inbar shares his journey from hacking childhood curiosities to restoring vintage hardware. With insights on firmware challenges and tales of overcoming tech troubles, this chat is both enlightening and fun, merging humor with the serious business of security.
AI Snips
Chapters
Transcript
Episode notes
Reverse Engineering Tools
- Reverse engineers should utilize interactive disassemblers and be prepared to create custom CPU modules for uncommon processors.
- Inbar Raz used Ghidra for his project and spent months writing a CPU module.
Firmware Findings
- Inbar Raz found interface strings and author names in the payphone firmware.
- He had to re-encode Hebrew strings due to older character encoding schemes.
Unusual CPU
- The payphone's CPU has unusual characteristics, including flexible instruction pointers and unconventional calling conventions.
- This makes reverse engineering more challenging due to the lack of standard procedures.
