Text Files - Section 4 - Phreaking

3rd party fraud and voice mail systems
Jesters guide to 50-0266's for the new phreaker
The truth behind those 9999 numbers
Acrylic box plans
Aerobox a new and improved phreaking method
How to break into an AT & T manhole and get away with it
How to forge Pacific Bell cards
Listening to air-ground phone communications
All you wanted to know about Alliance Teleconferencing
Telephone related frequencies
Analogue signalling systems
The Aqua box
An overview of the AXE 10 system architecture and functional structure
The Beagan box
Beige boxing
How to build a Black box
Building your own Blue box
The secrets of cellular phones
Build a POCSAG decoder using a BRAVO receiver board instead of a scanner Brown box plans
Bud boxing
Automatic phone recorder
How to build a bug detector
The Busy box
The telephone works
Canning for fun and profit
Complete list of cellular channel numbers and frequencies
How to connect any cellular phone to a modem
How to Tap Cellular Phones with a UHF Televison
The Chartreuse box
The Cheese box
The Chrome box
How to listen to phone conversations
The Copper box
VHF cordless telephones
Cable pair indication
The Crimson box
An introduction to diverters
The Dlock box
How to build a DMS-10 switch
All about dual tone/multi frequency
Fax machine fun  Fax interception
How to make an FM wireless bug
Telephone patches
Setting your home line up for free calls
  Radio frequencies of interest to telephone experimenters
Gold box plans
The Green box
The Hallmark box
Monitoring chordless telephone calls
How blue boxing works
How to get into the AT & T network by building your own mobile phone
The Modu box
A Motorola cellular phone programming manual
Olive box plans
The basics of phreaking p950's
Pager, fax and data intercept techniques
The Party box
Pay TV decoder plans
PBX hacking
How to make a Pearl box
Pink box plans
Motorola pager programmer interface
Phreakers Net
  How to build the power box
How to construct a Purple box
How to obtain Red box tones
All about REMOBS
Some numbers that always ring busy
The Rock box
All about wardialling
Secret Signals
How to build a Silver box
The Slug box
The Static box
Switchbox plans
Tapping in on phone conversations
What are DTMF frequencies ?
Tip on telephone privacy
(part 1) Tip on telephone privacy
(part 2) The wonderful world of pagers
White box plans

WARNING! READ CAREFULLY! This cd-rom contains information and tools that can be used to exploit computer and network security. The primary purpose of this CD-ROM is to aid security professionals in combating the tools and techniques used by malicious hackers. Under no circumstances should this CD-ROM be used to illegally circumvent computer or network security.