Content deleted Content added
←Replaced content with 'azulx' Tags: possible vandalism blanking |
ClueBot NG (talk | contribs) m Reverting possible vandalism by 109.98.161.129 to version by The Anome. Report False Positive? Thanks, ClueBot NG. (3196109) (Bot) |
||
Line 1:
{{Computer hacking}}
<!--ATTENTION:Please keep this list free of random phrases or personal names. Only commonly used phrases belong here -->
In programming and hacking culture, a '''script kiddie''' or '''skiddie'''<ref name="Reg01"/> is an [[Amateur|unskilled]] individual who uses [[scripting language|script]]s or programs developed by others to attack computer systems and networks and [[Website defacement|deface websites]]. It is generally assumed that most script kiddies are juveniles who lack the ability to write sophisticated programs or exploits on their own and that their objective is to try to impress their friends or gain credit in computer-enthusiast communities.<ref name="zdnet">{{cite web| last=Lemos| first=Robert| date=July 12, 2000 |url=http://www.zdnet.com/script-kiddies-the-nets-cybergangs-3002080125/ <!--http://www.zdnet.com/news/script-kiddies-the-nets-cybergangs/96163-->| publisher=[[ZDNet]]| title=Script kiddies: The Net's cybergangs| accessdate=2007-04-24}}</ref> However, the term does not relate to the actual age of the participant. The term is generally considered to be [[pejorative]].
==Characteristics==
In a [[Carnegie Mellon]] report prepared for the [[U.S. Department of Defense]] in 2005, script kiddies are defined as <blockquote>The more immature but unfortunately often just as dangerous exploiter of security lapses on the Internet. The typical script kiddy uses existing and frequently well known and easy-to-find techniques and programs or scripts to search for and exploit weaknesses in other computers on the Internet—often randomly and with little regard or perhaps even understanding of the potentially harmful consequences.<ref>{{cite web|author1=Mead, Nancy R. |author2=Hough, Eric D. |author3=Stehney, Theodore R. III |date=May 16, 2006 |url=http://www.cert.org/archive/pdf/05tr009.pdf |title=Security Quality Requirements Engineering (SQUARE) Methodology CMU/SEI-2005-TR-009 |format=PDF |work=Carnegie Mellon University, DOD |publisher=CERT.org}}</ref></blockquote>
Script kiddies have at their disposal a large number of effective, easily downloadable programs capable of breaching computers and networks.<ref name="zdnet">{{cite web| last=Lemos| first=Robert| date=July 12, 2000 |url=http://www.zdnet.com/script-kiddies-the-nets-cybergangs-3002080125/ <!--http://www.zdnet.com/news/script-kiddies-the-nets-cybergangs/96163-->| publisher=[[ZDNet]]| title=Script kiddies: The Net's cybergangs| accessdate=2007-04-24}}</ref> Such programs have included remote denial-of-service [[WinNuke]],<ref>{{cite book |author1=Klevinsky, T. J. |author2=Laliberte, Scott |author3=Gupta, Ajay |year=2002 |url=https://books.google.com/books?id=31Kis_vaadwC&pg=PA409&lpg=PA409#v=onepage&q&f=false |title=Hack I.T.: security through penetration testing| publisher=[[Addison-Wesley]] |isbn=978-0-201-71956-7}}</ref> [[Trojan horse (computing)|trojan]]s, [[Back Orifice]], [[NetBus]] and [[Sub7]]<ref>{{cite web|author=Granneman, Scott |date=January 28, 2004 | url=https://www.theregister.co.uk/2004/01/28/a_visit_from_the_fbi/ |title=A Visit from the FBI - We come in peace |publisher=[[The Register]]}}</ref> vulnerability scanner/injector kit [[Metasploit]]<ref>{{cite web|author=Biancuzzi, Federico |date=March 27, 2007 |url=http://www.securityfocus.com/columnists/439 |title=Metasploit 3.0 day |publisher=SecurityFocus.com}}</ref> and often software intended for legitimate security auditing.<ref name="Rodriguez">{{Cite web |url=https://www.htbridge.com/publication/the_growing_hacking_threat_to_websites.pdf |title=The Growing Hacking Threat to Websites: An Ongoing Commitment to Web Application Security |last1=Rodriguez |first1=Chris |last2=Martinez |first2=Richard |publisher=Frost & Sullivan |date=September 2, 2012<!--see pdf--> |accessdate=November 30, 2013}}</ref>
Script kiddies vandalize websites both for the thrill of it and to increase their reputation among their peers.<ref name="zdnet"/> Some more malicious script kiddies have used virus toolkits to create and propagate the [[Anna Kournikova (computer virus)|Anna Kournikova]] and [[ILOVEYOU|Love Bug]] viruses.<ref name="Reg01">{{cite web|author=Leyden, John|date=February 21, 2001|url=https://www.theregister.co.uk/2001/02/21/virus_toolkits_are_skiddie_menace/|title=Virus toolkits are s'kiddie menace |publisher=[[The Register]]}}</ref>
Script kiddies lack, or are only developing, programming skills sufficient to understand the effects and side effects of their actions. As a result, they leave significant traces which lead to their detection, or directly attack companies which have detection and countermeasures already in place, or in recent cases, leave automatic crash reporting turned on.<ref>{{cite web|author=Taylor, Josh |date=August 26, 2010|url=http://www.zdnet.com.au/hackers-accidentally-give-microsoft-their-code-339305548.htm?omnRef=NULL |title=Hackers accidentally give Microsoft their code|publisher=ZDNet.com.au}}</ref><ref>{{cite web|author=Ms. Smith|date=August 28, 2010|url=http://www.networkworld.com/community/node/65571 |title=Error Reporting Oops: Microsoft, Meter Maids and Malicious Code|work=Privacy and Security Fanatic|publisher=[[Network World]]}}</ref>
==See also==
{{portal|Computer security}}
* [[Black hat hacker]]
* [[Exploit (computer security)]]
* [[Hacker (computer security)]]
* [[Lamer]]
* [[List of convicted computer criminals]]
==References==
{{reflist|30em}}
==Further reading==
* {{cite book | last = Tapeworm | title = 1337 h4x0r h4ndb00k | year = 2005 | isbn = 0-672-32727-9 | publisher = Sams Publishing |}}
==External links==
* [http://old.honeynet.org/papers/enemy/ Honeynet.org - Know Your Enemy (Essay about script kiddies)]
{{DEFAULTSORT:Script Kiddie}}
[[Category:Hacking (computer security)]]
[[Category:Computing culture]]
[[Category:Pejorative terms for people]]
|