Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Script kiddie
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
{{Short description|Unskilled malicious hacker}} {{Computer hacking}} A '''script kiddie''', '''skript kiddie''', '''skiddie''', '''kiddie''', or '''skid''' is a pejorative term used to describe an unskilled individual who uses malicious scripts or programs developed by others or [[Large_language_model|LLMs]]. ==Characteristics== The term script kiddie was first used in 1988.<ref>{{Cite thesis |last=Arifgoğlu |first=Saliha Figen |title=Information security, privacy issues and an application |date=1988 |publisher=Middle East Technical University |type=Master's thesis }}</ref> In a Carnegie Mellon report prepared for the [[United States Department of Defense|US Department of Defence]] in 2000, script kiddies are defined as <blockquote>The more immature but unfortunately often just as dangerous exploiter of security lapses on the Internet. The typical script kiddy uses existing and frequently well known and easy-to-find techniques and programs or scripts to search for and exploit weaknesses in other computers on the Internet—often randomly and with little regard or perhaps even understanding of the potentially harmful consequences.<ref>{{cite report|publisher=[[Carnegie Mellon University]]|doi=10.1184/R1/6583673.v1|title=Security Quality Requirements Engineering (SQUARE) Methodology|author1=Mead, Nancy R.|author2=Hough, Eric|author3=Stehney, Theodore R.|date=31 October 2005|url=https://kilthub.cmu.edu/articles/journal_contribution/Security_Quality_Requirements_Engineering_SQUARE_Methodology/6583673/1}}</ref></blockquote> Script kiddies typically have at least one or more effective and easily downloadable programs capable of breaching computers and networks.<ref name="zdnet">{{cite news| last=Lemos| first=Robert| date=July 12, 2000 |url=https://www.zdnet.com/article/script-kiddies-the-nets-cybergangs/ <!--http://www.zdnet.com/news/script-kiddies-the-nets-cybergangs/96163-->| work=[[ZDNet]]| title=Script kiddies: The Net's cybergangs| access-date=2007-04-24}}</ref> Script kiddies vandalize websites both for the thrill of it and to increase their reputation among their peers.<ref name="zdnet"/> Some more malicious script kiddies have used virus toolkits to create and propagate the [[Anna Kournikova (computer virus)|Anna Kournikova]] and [[ILOVEYOU|Love Bug]] viruses.<ref name="Reg01">{{cite web|author=Leyden, John|date=February 21, 2001|url=https://www.theregister.co.uk/2001/02/21/virus_toolkits_are_skiddie_menace/|title=Virus toolkits are s'kiddie menace |website=[[The Register]]}}</ref> Script kiddies lack, or are only developing, programming skills sufficient to understand the effects and side effects of their actions. As a result, they leave significant traces which lead to their detection, or directly attack companies which have detection and countermeasures already in place, or in some cases, leave automatic crash reporting turned on.<ref>{{cite web|author=Taylor, Josh |date=August 26, 2010|url=https://www.zdnet.com/article/hackers-accidentally-give-microsoft-their-code/ |title=Hackers accidentally give Microsoft their code|publisher=ZDNet.com.au|archive-url=https://web.archive.org/web/20120120160424/http://www.zdnet.com.au/hackers-accidentally-give-microsoft-their-code-339305548.htm?omnRef=NULL |archive-date=January 20, 2012 |url-status=live}}</ref><ref>{{cite web|author=Ms. Smith|date=August 28, 2010|url=http://www.networkworld.com/community/node/65571 |title=Error Reporting Oops: Microsoft, Meter Maids and Malicious Code|work=Privacy and Security Fanatic|publisher=[[Network World]]|url-status=dead|archive-url=https://web.archive.org/web/20220816064753/https://www.csoonline.com/article/2227020/error-reporting-oops--microsoft--meter-maids-and-malicious-code.html|archive-date=August 16, 2022}}</ref> Although script kiddie attacks might become increasingly more effective in the future, researchers have noted that other models, like the language model, can also be used to enhance protection against the improved script kiddie attacks. This continuous back and forth improvement suggests that the competition between cyber attackers and defenders will continue to increase.<ref>{{Citation |last1=Moskal |first1=Stephen |title=LLMs Killed the Script Kiddie: How Agents Supported by Large Language Models Change the Landscape of Network Threat Testing |date=2023-10-10 |arxiv=2310.06936 |last2=Laney |first2=Sam |last3=Hemberg |first3=Erik |last4=O'Reilly |first4=Una-May}}</ref> ==See also== * [[Black hat hacker]] * [[Computer security]] * [[Exploit (computer security)]] * [[Hacker (computer security)]] *[[Hacktivism]] * [[Lamer]] * [[List of convicted computer criminals]] * [[Luser]] * [[Noob]] * [[Web shell]], a tool that script kiddies frequently use ==References== {{reflist|30em}} ==Further reading== * {{cite journal |author=Samuel Chng, Han Yu Lu, Ayush Kumar, David Yau |date=Mar 2022 |title=Hacker types, motivations and strategies: A comprehensive framework |url=https://www.sciencedirect.com/science/article/pii/S245195882200001X |journal=Computers in Human Behavior Reports |volume=5 |issn=2451-9588 |pages= |doi= |access-date=27 Jan 2022}} * {{cite book | last = Tapeworm | title = 1337 h4x0r h4ndb00k | url = https://archive.org/details/1337h4x0rh4ndb000000tape | url-access = registration | year = 2005 | isbn = 0-672-32727-9 | publisher = Sams Publishing }} * ''The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers'' (2005) {{ISBN|978-0471782667}} ==External links== * [https://web.archive.org/web/20180721180838/http://old.honeynet.org/papers/enemy Honeynet.org - Know Your Enemy (Essay about script kiddies)] preserved at [[Internet Archive]] * [https://deepminds.science/cracking-hacker-mindset/ Cracking the Hacker Mindset] {{Webarchive|url=https://web.archive.org/web/20180816063250/https://deepminds.science/cracking-hacker-mindset/ |date=2018-08-16 }} {{DEFAULTSORT:Script Kiddie}} [[Category:Hacking (computer security)]] [[Category:Hacker culture]] [[Category:Pejorative terms for people]]
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)
Pages transcluded onto the current version of this page
(
help
)
:
Template:Citation
(
edit
)
Template:Cite book
(
edit
)
Template:Cite journal
(
edit
)
Template:Cite news
(
edit
)
Template:Cite report
(
edit
)
Template:Cite thesis
(
edit
)
Template:Cite web
(
edit
)
Template:Computer hacking
(
edit
)
Template:ISBN
(
edit
)
Template:Reflist
(
edit
)
Template:Short description
(
edit
)
Template:Webarchive
(
edit
)