Script kiddie: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Howard C. Berkowitz
No edit summary
imported>Howard C. Berkowitz
No edit summary
Line 1: Line 1:
{{subpages}}
{{subpages}}
{{TOC|right}}
{{TOC|right}}
'''Script kiddie''' is a person who uses computer scripts or programs to attack computer systems and networks.<ref name=twsFEB26a>{{cite news
'''Script kiddie''' is a person who uses computer scripts or programs to attack computer systems and networks. One definition calls <blockquote>An unskilled [[hacker]] who originates nothing but simply steals code, techniques and attack methods from others. Many viruses and worms on the web today are simply patched together from other bits of code that malicious hackers share. <ref name=BBC2006-10-05>{{cite news
|author= Mark Ward
|author= Mark Ward
|title= Hi-tech crime: A glossary  
|title= Hi-tech crime: A glossary  
|quote= An unskilled hacker who originates nothing but simply steals code, techniques and attack methods from others. Many viruses and worms on the web today are simply patched together from other bits of code that malicious hackers share.
|publisher= BBC News
|publisher= BBC News
|date= 2006-10-05
|date= 2006-10-05
|url= http://news.bbc.co.uk/2/hi/uk_news/5400052.stm
|url= http://news.bbc.co.uk/2/hi/uk_news/5400052.stm
|accessdate= 2010-02-26
|accessdate= 2010-02-26
}}</ref> It's a derogatory term from hacker culture.<ref name=twsFEB26b>{{cite news
}}</ref></blockquote>
|author= Matthew Bath
 
|title= Silver Web surfers face unique challenges
It's a derogatory term from [[hacker]] culture.,where "hacker" was originally a term for highly skilled programmers that also subscribed to a do-no-harm [[hacker#Precursors and hacker ethic|hacker ethic]] or practice "ethical hacking.<ref name=LevyHome>{{citation
|quote= To a rational mind, much of our jargon-fuelled internet terminology is simply odd. In the digital world, cookies aren’t chocolate chip, frames don’t house pictures, a script kiddie isn’t a schoolchild learning a play, and spiders don’t eat flies. All of which means that if you’re new to computers and the internet, you can well be forgiven for feeling a little, well, out of your domain (name).
| title = Hackers - Heroes of the Computer Revolution
|publisher= Reuters
| first = Steven | last = Levy
|date= 2009-10-21
| url = http://www.stevenlevy.com/index.php/other-books/hackers}}</ref> Substitute terms include ''skiddie'' or ''script bunny'', ''skid'', ''script kitty'', and ''script-running juvenile (SRJ)''. A common conception is that they're juveniles who lack the ability to write their own hacking programs, and write these programs to try to impress their friends and win renown.<ref name="zdnet">{{cite web| last=Lemos| first=Robert| url=http://news.zdnet.com/2100-9595_22-502632.html| publisher=[[ZDNet]]| title=Script kiddies: The Net's cybergangs| accessdate=2007-04-24}}</ref> The term often means "anonymous mischief makers" and is usually applied to teenagers, college students, who "don't yet have the skill to program computers but like to pretend that they do."<ref name=twsFEB26d>{{cite news
|url= http://blogs.reuters.com/great-debate-uk/2009/10/21/silver-web-surfers-face-unique-challenges/
|accessdate= 2010-02-26
}}</ref> Substitute terms include ''skiddie'' or ''script bunny'', ''skid'', ''script kitty'', and ''script-running juvenile (SRJ)''. A common conception is that they're juveniles who lack the ability to write their own hacking programs, and write these programs to try to impress their friends and win renown.<ref name="zdnet">{{cite web| last=Lemos| first=Robert| url=http://news.zdnet.com/2100-9595_22-502632.html| publisher=[[ZDNet]]| title=Script kiddies: The Net's cybergangs| accessdate=2007-04-24}}</ref><ref name=twsFEB26a/> The term often means "anonymous mischief makers" and is usually applied to teenagers, college students, who "don't yet have the skill to program computers but like to pretend that they do."<ref name=twsFEB26d>{{cite news
|author= Clive Thompson
|author= Clive Thompson
|title= The Virus Underground
|title= The Virus Underground
|quote= The people who release the viruses are often anonymous mischief-makers, or ''script kiddies.'' That's a derisive term for aspiring young hackers, usually teenagers or curious college students, who don't yet have the skill to program computers but like to pretend they do. They download the viruses, claim to have written them themselves and then set them free in an attempt to assume the role of a fearsome digital menace.
|publisher= The New York Times: Magazine
|publisher= The New York Times: Magazine
|date= February 8, 2004
|date= February 8, 2004
|url= http://www.nytimes.com/2004/02/08/magazine/08WORMS.html?pagewanted=all
|url= http://www.nytimes.com/2004/02/08/magazine/08WORMS.html?pagewanted=all
|accessdate= 2010-02-26
|accessdate= 2010-02-26
}}</ref> They've been described as "low-level malicious hackers" motivated by mischief and revenge.<ref name=twsFEB26e>{{cite news
}}</ref> They've been described as "low-level [[miscreant|malicious hackers]]" motivated by mischief and revenge.<ref name=twsFEB26e>{{cite news
|author= Jon Swartz
|author= Jon Swartz
|title= Tech pros get to know their enemy
|title= Tech pros get to know their enemy
Line 36: Line 31:


==Destructiveness==
==Destructiveness==
'''Script kiddies''' have the capability of harassing advanced computers and networks.<ref name="zdnet"/> Mass mailer worms can spread through e-mails and can slow down network performance by using up too much bandwidth. Some programs can delete encrypted files. A denial of service attack or DoS can attempt to overwhelm a server.<ref>{{cite web| url=http://www.cert.org/tech_tips/denial_of_service.html| publisher=[[Carnegie Mellon University]]| title=Denial of Service Attacks|accessdate=2008-12-22}}</ref> There are some indications of a trend that elite virus writers ''publish'' their code on the web with detailed descriptions of how they work, and in essence, "leave their viruses lying around for anyone to use."<ref name=twsFEB26d/> But script kiddies use the code and can possibly cause a "digital plague."<ref name=twsFEB26d/> The SoBig.F virus and Blaster worm cost U.S. businesses and consumers billions of dollars in lost productivity in the summer of 2003.<ref name=twsFEB26e/> Courses are offered to teach programmers how to defend against hacker attacks.<ref name=twsFEB26e/>
'''Script kiddies''' have the capability of harassing advanced computers and networks.<ref name="zdnet"/> Mass mailer worms can spread through e-mails and can slow down network performance by using up too much bandwidth. Some programs can delete encrypted files. A denial of service attack or DoS can attempt to overwhelm a server.<ref>{{cite web| url=http://www.cert.org/tech_tips/denial_of_service.html| publisher=[[Carnegie Mellon University]]| title=Denial of Service Attacks|accessdate=2008-12-22}}</ref>  
 
There are some indications of a trend that skilled virus writers ''publish'' their code on the web with detailed descriptions of how they work, and in essence, "leave their viruses lying around for anyone to use." But script kiddies use the code and can possibly cause a "digital plague."<ref name=twsFEB26d/> The SoBig.F virus and Blaster worm cost U.S. businesses and consumers billions of dollars in lost productivity in the summer of 2003.<ref name=twsFEB26e/> Courses are offered to teach programmers how to defend against hacker attacks.<ref name=twsFEB26e/>


==Cases==
==Cases==
Line 52: Line 49:
}}</ref> The hacker denied being a "script kiddie", and elaborated that the term meant "someone who can't program in any language."<ref name=twsFEB26c/>
}}</ref> The hacker denied being a "script kiddie", and elaborated that the term meant "someone who can't program in any language."<ref name=twsFEB26c/>


*In 2009, analysts wondered whether hackers from [[North Korea]] had deliberately launched a cyber attack against U.S. government and South Korean websites, although there was speculation about who was behind the attacks; but most analysts agreed that the attacks were not perpetrated by "script kitty" level programmers.<ref name=twsFEB26f>{{cite news
*In 2009, analysts wondered whether hackers from [[North Korea]] had deliberately launched a cyber attack against U.S. government and South Korean websites, although there was speculation about who was behind the attacks; but most analysts agreed that the attacks were not perpetrated by "script kitty" level programmers.<blockquote>Cybersecurity analysts raised doubts on Wednesday that the North Korean state launched recent attacks on U.S. government and South Korean websites, saying industrial spies or pranksters could be the villains... "This is not something that your average 'script kitty' can do.<ref name=twsFEB26f>{{cite news
|author= Reuters
|author= Reuters
|title= Cyber attacks may not have come from North Korea
|title= Cyber attacks may not have come from North Korea
|quote= Cybersecurity analysts raised doubts on Wednesday that the North Korean state launched recent attacks on U.S. government and South Korean websites, saying industrial spies or pranksters could be the villains... "This is not something that your average 'script kitty' can do.
|publisher= Reuters
|publisher= Reuters
|date= 2009-07-08
|date= 2009-07-08
|url= http://www.reuters.com/article/idUSTRE5680C220090709
|url= http://www.reuters.com/article/idUSTRE5680C220090709
|accessdate= 2010-02-26
|accessdate= 2010-02-26
}}</ref>
}}</ref></blockquote>
 
==See also==
 
==Related Books==
* {{cite book | last = Tapeworm | first =  | title = 1337 h4x0r h4ndb00k | year = 2005 | isbn = 0672327279 | publisher = Sams Publishing }}


==References==
==References==
{{Reflist}}
{{Reflist|2}}

Revision as of 14:24, 26 February 2010

This article is developing and not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
This editable Main Article is under development and subject to a disclaimer.

Script kiddie is a person who uses computer scripts or programs to attack computer systems and networks. One definition calls

An unskilled hacker who originates nothing but simply steals code, techniques and attack methods from others. Many viruses and worms on the web today are simply patched together from other bits of code that malicious hackers share. [1]

It's a derogatory term from hacker culture.,where "hacker" was originally a term for highly skilled programmers that also subscribed to a do-no-harm hacker ethic or practice "ethical hacking.[2] Substitute terms include skiddie or script bunny, skid, script kitty, and script-running juvenile (SRJ). A common conception is that they're juveniles who lack the ability to write their own hacking programs, and write these programs to try to impress their friends and win renown.[3] The term often means "anonymous mischief makers" and is usually applied to teenagers, college students, who "don't yet have the skill to program computers but like to pretend that they do."[4] They've been described as "low-level malicious hackers" motivated by mischief and revenge.[5]

Destructiveness

Script kiddies have the capability of harassing advanced computers and networks.[3] Mass mailer worms can spread through e-mails and can slow down network performance by using up too much bandwidth. Some programs can delete encrypted files. A denial of service attack or DoS can attempt to overwhelm a server.[6]

There are some indications of a trend that skilled virus writers publish their code on the web with detailed descriptions of how they work, and in essence, "leave their viruses lying around for anyone to use." But script kiddies use the code and can possibly cause a "digital plague."[4] The SoBig.F virus and Blaster worm cost U.S. businesses and consumers billions of dollars in lost productivity in the summer of 2003.[5] Courses are offered to teach programmers how to defend against hacker attacks.[5]

Cases

Script kiddies are sometimes able to exploit vulnerable systems. Some examples include:

  • In 1999, a computer script program was used to discredit a law student named Magnus Eriksson studying at the Lund University in Sweden. Child pornography was uploaded onto his computer from an unidentified location. He was later acquitted of charges in 2004 when it was discovered that his computer had become controlled by the script kiddie program.[7]
  • In 2001, a hacker allegedly broke into credit card files and sent Bill Gates Viagra, according to BBC News.[8] The hacker denied being a "script kiddie", and elaborated that the term meant "someone who can't program in any language."[8]
  • In 2009, analysts wondered whether hackers from North Korea had deliberately launched a cyber attack against U.S. government and South Korean websites, although there was speculation about who was behind the attacks; but most analysts agreed that the attacks were not perpetrated by "script kitty" level programmers.

    Cybersecurity analysts raised doubts on Wednesday that the North Korean state launched recent attacks on U.S. government and South Korean websites, saying industrial spies or pranksters could be the villains... "This is not something that your average 'script kitty' can do.[9]

References

  1. Mark Ward. Hi-tech crime: A glossary, BBC News, 2006-10-05. Retrieved on 2010-02-26.
  2. Levy, Steven, Hackers - Heroes of the Computer Revolution
  3. 3.0 3.1 Lemos, Robert. Script kiddies: The Net's cybergangs. ZDNet. Retrieved on 2007-04-24.
  4. 4.0 4.1 Clive Thompson. The Virus Underground, The New York Times: Magazine, February 8, 2004. Retrieved on 2010-02-26.
  5. 5.0 5.1 5.2 Jon Swartz. Tech pros get to know their enemy, USA Today, 2003-09-23. Retrieved on 2010-02-26. “Script kiddie: Low-level malicious hacker, usually motivated by mischief and revenge.”
  6. Denial of Service Attacks. Carnegie Mellon University. Retrieved on 2008-12-22.
  7. Offer för porrkupp. Expressen (November 28, 2004).
  8. 8.0 8.1 The hacker who sent Viagra to Bill Gates, BBC News, 2001-07-12. Retrieved on 2010-02-26. “A lot of crackers don't like what I did. They consider me to be a script kiddie, someone who can't program in any language, because I used an old exploit instead of creating a new one. But I've been programming since I was 11.”
  9. Reuters. Cyber attacks may not have come from North Korea, Reuters, 2009-07-08. Retrieved on 2010-02-26.