Paul's Security Weekly (Audio)

When Public Payphones Become Smart Phones - Inbar Raz - PSW #855

7 snips
Dec 19, 2024
Inbar Raz, VP of Research at Zenity and retrocomputing enthusiast, dives into the security world of smart payphones. He reveals how attackers could exploit these devices, diving into VoIP vulnerabilities and AI's role in cybersecurity. The conversation takes a nostalgic turn as Inbar shares his journey from hacking childhood curiosities to restoring vintage hardware. With insights on firmware challenges and tales of overcoming tech troubles, this chat is both enlightening and fun, merging humor with the serious business of security.
Ask episode
AI Snips
Chapters
Transcript
Episode notes
ADVICE

Reverse Engineering Tools

  • Reverse engineers should utilize interactive disassemblers and be prepared to create custom CPU modules for uncommon processors.
  • Inbar Raz used Ghidra for his project and spent months writing a CPU module.
ANECDOTE

Firmware Findings

  • Inbar Raz found interface strings and author names in the payphone firmware.
  • He had to re-encode Hebrew strings due to older character encoding schemes.
INSIGHT

Unusual CPU

  • The payphone's CPU has unusual characteristics, including flexible instruction pointers and unconventional calling conventions.
  • This makes reverse engineering more challenging due to the lack of standard procedures.
Get the Snipd Podcast app to discover more snips from this episode
Get the app