I would believe so since part of phreaking is solely exploiting configuration. For example, a default password for voicemail lets the phreaker access user menu then possibly - or so I was told - call capability.
This could be a first step in social engineering where an insider call gets easily trusted.
This could be a first step in social engineering where an insider call gets easily trusted.