Content deleted Content added
ClueBot NG (talk | contribs) m Reverting possible vandalism by 217.179.93.218 to version by Prinsgezinde. Report False Positive? Thanks, ClueBot NG. (3086021) (Bot) |
Jon Kolbert (talk | contribs) m updated reference link from using http to https |
||
Line 6:
In a [[Carnegie Mellon]] report prepared for the [[U.S. Department of Defense]] in 2005, script kiddies are defined as <blockquote>The more immature but unfortunately often just as dangerous exploiter of security lapses on the Internet. The typical script kiddy uses existing and frequently well known and easy-to-find techniques and programs or scripts to search for and exploit weaknesses in other computers on the Internet—often randomly and with little regard or perhaps even understanding of the potentially harmful consequences.<ref>{{cite web|author1=Mead, Nancy R. |author2=Hough, Eric D. |author3=Stehney, Theodore R. III |date=May 16, 2006 |url=http://www.cert.org/archive/pdf/05tr009.pdf |title=Security Quality Requirements Engineering (SQUARE) Methodology CMU/SEI-2005-TR-009 |format=PDF |work=Carnegie Mellon University, DOD |publisher=CERT.org}}</ref></blockquote>
Script kiddies have at their disposal a large number of effective, easily downloadable programs capable of breaching computers and networks.<ref name="zdnet">{{cite web| last=Lemos| first=Robert| date=July 12, 2000 |url=http://www.zdnet.com/script-kiddies-the-nets-cybergangs-3002080125/ <!--http://www.zdnet.com/news/script-kiddies-the-nets-cybergangs/96163-->| publisher=[[ZDNet]]| title=Script kiddies: The Net's cybergangs| accessdate=2007-04-24}}</ref> Such programs have included remote denial-of-service [[WinNuke]],<ref>{{cite book |author1=Klevinsky, T. J. |author2=Laliberte, Scott |author3=Gupta, Ajay |year=2002 |url=https://books.google.com/books?id=31Kis_vaadwC&pg=PA409&lpg=PA409#v=onepage&q&f=false |title=Hack I.T.: security through penetration testing| publisher=[[Addison-Wesley]] |isbn=978-0-201-71956-7}}</ref> [[Trojan horse (computing)|trojan]]s, [[Back Orifice]], [[NetBus]] and [[Sub7]]<ref>{{cite web|author=Granneman, Scott |date=January 28, 2004 | url=
Script kiddies vandalize websites both for the thrill of it and to increase their reputation among their peers.<ref name="zdnet"/> Some more malicious script kiddies have used virus toolkits to create and propagate the [[Anna Kournikova (computer virus)|Anna Kournikova]] and [[ILOVEYOU|Love Bug]] viruses.<ref name="Reg01">{{cite web|author=Leyden, John|date=February 21, 2001|url=
Script kiddies lack, or are only developing, programming skills sufficient to understand the effects and side effects of their actions. As a result, they leave significant traces which lead to their detection, or directly attack companies which have detection and countermeasures already in place, or in recent cases, leave automatic crash reporting turned on.<ref>{{cite web|author=Taylor, Josh |date=August 26, 2010|url=http://www.zdnet.com.au/hackers-accidentally-give-microsoft-their-code-339305548.htm?omnRef=NULL |title=Hackers accidentally give Microsoft their code|publisher=ZDNet.com.au}}</ref><ref>{{cite web|author=Ms. Smith|date=August 28, 2010|url=http://www.networkworld.com/community/node/65571 |title=Error Reporting Oops: Microsoft, Meter Maids and Malicious Code|work=Privacy and Security Fanatic|publisher=[[Network World]]}}</ref>
|