Date First Published: 4th June 2023
Topic: Cybersecurity
Subtopic: Threats To Systems, Data & Information
Article Type: Computer Terms & Definitions
Difficulty: MediumDifficulty Level: 7/10
Learn more about what phreaking is in this article.
Phreaking is the act of exploiting vulnerabilities in telephone systems to gain unauthorised access to restricted telephone services or areas, often to obtain free phone calls, bypass calling restrictions, have calls charged to someone else's account, and even take control of entire telephone networks. Phreakers can also use social engineering tactics to hack into restricted areas or services rather than technical skills and knowledge.
Whilst phreaking is a fraudulent practice of hacking into telecommunication systems, like computer hacking, not all phreaking is malicious and can be used to test the security of systems. This can be used to identify any vulnerabilities that need to be fixed as a form of penetration testing.
Phreaking often involves fraudulent manipulation of telephone signalling. Examples of methods used to phreak a system include:
Below are five different types of phreaking.
The term "phreaking", a combination of the words "phone" and "freaking" was first used in the 1970s by a group of hackers who could make long-distance calls free of charge by mimicking the tones used by the telephone system. Phreaking is sometimes considered the predecessor to computer hacking since it took place before personal computers became popular. One of the earliest documented cases of phreaking happened in 1878 when a group of teenagers worked out how to use a whistle to make free phone calls.
Originally, the term "phreaking" referred to the process of exploring and manipulating telephone systems by mimicking dialling tones using blue boxes or whistles. The reason why people engaged in phreaking was because of their curiosity about how phone networks operated, not to defraud telecommunication companies. Now, the term has become synonymous with computer hacking and is a form of hacking that takes place over telecommunication networks.
If so, it is important that you tell me as soon as possible on this page.
Network Services Network Setups Network Standards Network Hardware Network Identifiers Network Software Internet Protocols Internet Organisations Data Transmission Technologies Web Development Web Design Web Advertising Web Applications Web Organisations Web Technologies Web Services SEO Threats To Systems, Data & Information Security Mechanisms & Technologies Computer Hardware Computer Software Ethics & Sustainability Legislation & User Data Protection