Content deleted Content added
No edit summary |
simplified lead sentence Tags: Visual edit Mobile edit Mobile web edit |
||
(716 intermediate revisions by more than 100 users not shown) | |||
Line 1:
{{Short description|Unskilled malicious hacker}}
{{Computer hacking}}
A '''script kiddie''', '''skript kiddie''', '''skiddie''', '''kiddie''', or '''skid''' is a pejorative for an unskilled individual who uses malicious scripts or programs developed by others or [[Large_language_model|LLMs]].
==Characteristics==
The term script kiddie was first used in 1988.<ref>{{Cite thesis |last=Arifgoğlu |first=Saliha Figen |title=Information security, privacy issues and an application |date=1988 |publisher=Middle East Technical University |type=Master's thesis }}</ref>
In a Carnegie Mellon report prepared for the
Script kiddies typically have at least one or more effective and easily downloadable programs capable of breaching computers and networks.<ref name="zdnet">{{cite news| last=Lemos| first=Robert| date=July 12, 2000 |url=https://www.zdnet.com/article/script-kiddies-the-nets-cybergangs/ <!--http://www.zdnet.com/news/script-kiddies-the-nets-cybergangs/96163-->| work=[[ZDNet]]| title=Script kiddies: The Net's cybergangs| access-date=2007-04-24}}</ref>
Script kiddies vandalize
Script kiddies lack, or are only developing,
Although script kiddie attacks might become increasingly more effective in the future, researchers have noted that other models, like the language model, can also be used to enhance protection against the improved script kiddie attacks. This continuous back and forth improvement suggests that the competition between cyber attackers and defenders will continue to increase.<ref>{{Citation |last1=Moskal |first1=Stephen |title=LLMs Killed the Script Kiddie: How Agents Supported by Large Language Models Change the Landscape of Network Threat Testing |date=2023-10-10 |arxiv=2310.06936 |last2=Laney |first2=Sam |last3=Hemberg |first3=Erik |last4=O'Reilly |first4=Una-May}}</ref>
==See also==
* [[Black hat hacker]]
* [[Computer security]]
* [[Exploit (computer security)]]
* [[Hacker (computer security)]]
*
* [[
* [[List of convicted computer criminals]]
* [[Luser]]
* [[Noob]]
* [[Web shell]], a tool that script kiddies frequently use
==References==
{{reflist|
==Further reading==
* {{cite journal |author=Samuel Chng, Han Yu Lu, Ayush Kumar, David Yau |date=Mar 2022 |title=Hacker types, motivations and strategies: A comprehensive framework |url=https://www.sciencedirect.com/science/article/pii/S245195882200001X |journal=Computers in Human Behavior Reports |volume=5 |issn=2451-9588 |pages= |doi= |access-date=27 Jan 2022}}
* {{cite book | last = Tapeworm | title = 1337 h4x0r h4ndb00k | url = https://archive.org/details/1337h4x0rh4ndb000000tape | url-access = registration | year = 2005 | isbn = 0-672-32727-9 | publisher = Sams Publishing }}
* ''The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers'' (2005) {{ISBN|978-0471782667}}
==External links==
* [https://web.archive.org/web/20180721180838/http://old.honeynet.org/papers/enemy
* [https://deepminds.science/cracking-hacker-mindset/ Cracking the Hacker Mindset] {{Webarchive|url=https://web.archive.org/web/20180816063250/https://deepminds.science/cracking-hacker-mindset/ |date=2018-08-16 }}
{{DEFAULTSORT:Script Kiddie}}
[[Category:Hacking (computer security)]]
[[Category:
[[Category:Pejorative terms for people]]
|