FACTOID # 10: The total number of state executions in 2005 was 60: 19 in Texas and 41 elsewhere. The racial split was 19 Black and 41 White.
 Home   Encyclopedia   Statistics   States A-Z   Flags   Maps   FAQ   About 


FACTS & STATISTICS    Advanced view

Search encyclopedia, statistics and forums:



(* = Graphable)



Encyclopedia > Script kiddie

In hacker culture, a script kiddie (occasionally script bunny, skidie, script kitty, script-running juvenile (SRJ), or similar) is (sometimes) a derogatory term used for an inexperienced malicious cracker who uses programs developed by others to attack computer systems, and deface websites. It is generally assumed that script kiddies are kids who lack the ability to write sophisticated hacking programs on their own,[1] and that their objective is to try to impress their friends or gain credit in underground cracker communities.[1] To meet Wikipedias quality standards, this article or section may require cleanup. ... A black-hat is a term in computing for someone who compromises the security of a system without permission from an authorized party, usually with the intent of accessing computers connected to the network. ... To meet Wikipedias quality standards, this article may require cleanup. ... A website defacement is when a Defacer breaks into a web server and alters the hosted website or creates one of his own. ...


Script kiddie scene

In modern cracker and Internet subcultures, script kiddies are widely considered novices, who seek reputation by free-riding on the work of the hacker community. The goal is typically to impress friends.[2] Portrayed as teenage technological dilettante, script kiddies are the subject of contempt among experienced hackers. In spite of this, they are feared among network administrators for their ability to scan many computer systems automatically over the course of days or weeks to find weak points.[3] The fact that very little technical knowledge is needed to download these programs is an added threat, since nearly any individual on the Internet can obtain malicious viruses and the means to infect large numbers of computers, costing the owners up to millions of dollars in damage. The terms network administrator, network specialist and network analyst designate job positions of engineers involved in computer networks, the people who carry out network administration. ...


Script kiddies often scan thousands of computers looking for vulnerable targets before initiating an attack. This is similar to wardialing and wardriving in which the attacker isn't looking at one specific system, but instead anything that is open and looks interesting. War dialing or wardialing was a technique in the 1980s and 90s by which a computer would repeatedly dial a number (usually to a crowded modem pool) in an attempt to gain access immediately after another user had hung up. ... Wardriving is the act of searching for Wi-Fi wireless networks by a person in a moving vehicle using a Wi-Fi-equipped computer, such as a laptop or a PDA, to detect the networks. ...

Script kiddies often deface random sites and vulnerable targets. They misuse "Google Dorks" (search methods designed to find vulnerable machines), and attack most sites available. For example, when an easy exploit is released, in a matter of minutes, script kiddie groups join and start defacing. In computer security, an exploit is a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to get unintended or unanticipated behavior out of computer software, hardware, or something electronic (usually computerized). ...


Script kiddies have at their disposal a large number of effective, easily downloadable malicious programs capable of harassing even advanced computers and networks.[1] Such programs have included WinNuke applications, Back Orifice, NetBus, Sub7, Metasploit, ProRat and any auditing program as well. The term WinNuke refers to a remote denial-of-service attack (DoS) that affected the Microsoft Windows 95, Microsoft Windows NT and Microsoft Windows 3. ... Back Orifice (often shortened to BO) is a controversial computer program designed for remote system administration. ... NetBus or Netbus is a software program for remotely controlling a Microsoft Windows computer system over a network. ... Sub7, or SubSeven, is the name of a popular backdoor program. ... The Metasploit Project is an open source computer security project which provides information about security vulnerabilities and aids in penetration testing and IDS signature development. ... ProRat client ProRat is a Microsoft Windows based backdoor trojan horse, more commonly known to the Hacker community as a RAT (Remote Administration Tool). ...

Another simple means of attack is a computer worm. These are spread through e-mails, and once opened, it can be automatically sent throughout the entire system, often without the users realizing it. The purpose of a worm varies, from sapping the targeted computer or network of bandwidth and therefore slowing performance, to deleting or encoding files. Other commands can be preprogrammed before they are released into a host. This is about the computer worm. ... This article does not cite any references or sources. ...

In a denial-of-service attack (DoS), the attacker tries to shut down network activity in a target system by sapping the computer network of bandwidth. A number of distinct DoS attacks have been created which pursue this goal through different means, such as SYN flood, ICMP flood (a.k.a smurf attack) and ping floods. If the server gets overwhelmed with excessive amounts of information, it will stop responding, and may require a restart. A denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended users. ... A normal connection between a user (Alice) and a server. ... The (ICMP) is one of the core protocols of the Internet protocol suite. ... The smurf attack, named after its exploit program, is a denial-of-service attack which uses spoofed broadcast ping messages to flood a target system. ... A ping flood is a simple Denial of service attack where the attacker overwhelms the victim with ICMP Echo Request (ping) packets. ...

Famous examples

Script kiddies are often able to exploit vulnerable systems and strike with great success. The most famous examples include:

  • A 15-year-old script kiddie called MafiaBoy was arrested in an upper class neighborhood in Montreal in 2000. Using downloaded tools to begin DoS attacks, he struck famous websites such as Yahoo!, Dell, Inc., eBay, and CNN, causing roughly $7.5 million worth of damage. He pleaded guilty to 55 criminal charges and served 8 months in a youth detention center.
  • In 1999, NetBus was used to discredit a law student named Magnus Eriksson studying at the University of Lund. Child pornography was uploaded onto his computer from an unidentified location. He was later acquitted of charges in 2004 when it was discovered that NetBus had been used to control his computer.
  • Jeffrey Lee Parson, an 18-year-old high school student from Minnesota was responsible for using the B variant of the infamous Blaster worm. The program was part of a DoS attack against computers using the Microsoft Windows operating system. The attack took the form of a SYN flood which caused only minimal damage. He was sentenced to 18 months in prison in 2005.

This article or section does not adequately cite its references or sources. ... Yahoo! - Wikipedia, the free encyclopedia /**/ @import /skins-1. ... Dell Inc. ... This article is about online auction centre. ... The Cable News Network, commonly known as CNN, is a major cable television network founded in 1980 by Ted Turner. ... A youth detention center, also known as Juvenile Hall is a prison for people under the age of 18. ... NetBus or Netbus is a software program for remotely controlling a Microsoft Windows computer system over a network. ... Lund University Lund University (Swedish: Lunds universitet) is a university in Lund in southernmost Sweden. ... Child pornography refers to pornographic material depicting children. ... The Blaster worm (a. ... The Blaster worm (a. ... A normal connection between a user (Alice) and a server. ...


  1. ^ a b c Lemos, Robert. Script kiddies: The Net's cybergangs Retrieved on 24 April 2007.
  2. ^ Michael Fitzgerald Hackers, Hackers and Script Kiddies, Oh My!: How to sort the good guys from the bad, in the Internet version of Spy vs. Spy.
  3. ^ Honeynet Project Know Your Enemy. Retrieved on 24 April 2007.

See also

This article does not cite any references or sources. ... To meet Wikipedias quality standards, this article or section may require cleanup. ... A black-hat is a term in computing for someone who compromises the security of a system without permission from an authorized party, usually with the intent of accessing computers connected to the network. ...

Related Books

  • tapeworm, tapeworm (2005). 1337 h4x0r h4ndb00k. Sams Publishing. ISBN 0672327279. 

External links

  • Honeynet.org - Know Your Enemy (Script Kiddie Essay)
  • ZDNet - Script kiddies: The Net's cybergangs

  Results from FactBites:
Script Kiddie Recruits (342 words)
Script Kiddies must be able to climax on-line without spraying their keyboard, Mom, Prison Officer, or monitor.
Script Kiddies must be able to inflate their other lover in less than 30 seconds.
Script Kiddies must be able to bait mouse and rat traps by using only artificial cheese.
  More results at FactBites »



Share your thoughts, questions and commentary here
Your name
Your comments

Want to know more?
Search encyclopedia, statistics and forums:


Press Releases |  Feeds | Contact
The Wikipedia article included on this page is licensed under the GFDL.
Images may be subject to relevant owners' copyright.
All other elements are (c) copyright NationMaster.com 2003-5. All Rights Reserved.
Usage implies agreement with terms, 1022, m