Script kiddie: Difference between revisions

Content deleted Content added
Accuracy
Shinra07 (talk | contribs)
Undid revision 784163196 by 81.2.233.244 (talk) (Vandalism)
Line 1:
{{Computer hacking}}
<!--ATTENTION:Please keep this list free of random phrases or personal names. Only commonly used phrases belong here -->
Glove is a script kiddie. In programming and hacking culture, a '''script kiddie''' or '''skiddie'''<ref name="Reg01"/> (other names include ''skid'' or ''script bunny'')<ref>{{cite web |url=http://www.spywareguide.com/term_show.php?id=92 |title=Script bunny - definition |publisher=SpywareGuide.com}}</ref> is an [[Amateur|unskilled]] individual (like Glove) who uses [[scripting language|script]]s or programs developed by others to attack computer systems and networks and [[Website defacement|deface websites]]. Glove is a script kiddie. It is generally assumed that script kiddies are juveniles who lack the ability to write sophisticated programs or exploits on their own and that their objective is to try to impress their friends or gain credit in computer-enthusiast communities.<ref name="zdnet">{{cite web| last=Lemos| first=Robert| date=July 12, 2000 |url=http://www.zdnet.com/script-kiddies-the-nets-cybergangs-3002080125/ <!--http://www.zdnet.com/news/script-kiddies-the-nets-cybergangs/96163-->| publisher=[[ZDNet]]| title=Script kiddies: The Net's cybergangs| accessdate=2007-04-24}}</ref> However, the term does not relate to the actual age of the participant. The term is generally considered to be [[pejorative]]. Glove is a script kiddie. Glove is a script kiddie.
 
==Characteristics==
Glove is a script kiddie.In a [[Carnegie Mellon]] report prepared for the [[U.S. Department of Defense]] in 2005, script kiddies are defined as <blockquote>The more immature but unfortunately often just as dangerous exploiter of security lapses on the Internet. The typical script kiddy uses existing and frequently well known and easy-to-find techniques and programs or scripts to search for and exploit weaknesses in other computers on the Internet—often randomly and with little regard or perhaps even understanding of the potentially harmful consequences.<ref>{{cite web|author1=Mead, Nancy R. |author2=Hough, Eric D. |author3=Stehney, Theodore R. III |date=May 16, 2006 |url=http://www.cert.org/archive/pdf/05tr009.pdf |title=Security Quality Requirements Engineering (SQUARE) Methodology CMU/SEI-2005-TR-009 |format=PDF |work=Carnegie Mellon University, DOD |publisher=CERT.org}}</ref></blockquote>
 
Script kiddies have at their disposal a large number of effective, easily downloadable programs capable of breaching computers and networks.<ref name="zdnet">{{cite web| last=Lemos| first=Robert| date=July 12, 2000 |url=http://www.zdnet.com/script-kiddies-the-nets-cybergangs-3002080125/ <!--http://www.zdnet.com/news/script-kiddies-the-nets-cybergangs/96163-->| publisher=[[ZDNet]]| title=Script kiddies: The Net's cybergangs| accessdate=2007-04-24}}</ref> Such programs have included remote denial-of-service [[WinNuke]],<ref>{{cite book |author1=Klevinsky, T. J. |author2=Laliberte, Scott |author3=Gupta, Ajay |year=2002 |url=https://books.google.com/books?id=31Kis_vaadwC&pg=PA409&lpg=PA409#v=onepage&q&f=false |title=Hack I.T.: security through penetration testing| publisher=[[Addison-Wesley]] |isbn=978-0-201-71956-7}}</ref> [[Trojan horse (computing)|trojan]]s, [[Back Orifice]], [[NetBus]] and [[Sub7]]<ref>{{cite web|author=Granneman, Scott |date=January 28, 2004 | url=http://www.theregister.co.uk/2004/01/28/a_visit_from_the_fbi/ |title=A Visit from the FBI - We come in peace |publisher=[[The Register]]}}</ref> vulnerability scanner/injector kit [[Metasploit]]<ref>{{cite web|author=Biancuzzi, Federico |date=March 27, 2007 |url=http://www.securityfocus.com/columnists/439 |title=Metasploit 3.0 day |publisher=SecurityFocus.com}}</ref> and often software intended for legitimate security auditing.<ref name="Rodriguez">{{Cite web |url=https://www.htbridge.com/publication/the_growing_hacking_threat_to_websites.pdf |title=The Growing Hacking Threat to Websites: An Ongoing Commitment to Web Application Security |last1=Rodriguez |first1=Chris |last2=Martinez |first2=Richard |publisher=Frost & Sullivan |date=September 2, 2012<!--see pdf--> |accessdate=November 30, 2013}}</ref>