<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://www.boywiki.org/en/index.php?action=history&amp;feed=atom&amp;title=Script_kiddie</id>
	<title>Script kiddie - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://www.boywiki.org/en/index.php?action=history&amp;feed=atom&amp;title=Script_kiddie"/>
	<link rel="alternate" type="text/html" href="https://www.boywiki.org/en/index.php?title=Script_kiddie&amp;action=history"/>
	<updated>2026-04-28T14:01:01Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.45.3</generator>
	<entry>
		<id>https://www.boywiki.org/en/index.php?title=Script_kiddie&amp;diff=31783&amp;oldid=prev</id>
		<title>Etenne at 18:50, 13 February 2016</title>
		<link rel="alternate" type="text/html" href="https://www.boywiki.org/en/index.php?title=Script_kiddie&amp;diff=31783&amp;oldid=prev"/>
		<updated>2016-02-13T18:50:03Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 18:50, 13 February 2016&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot;&gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&#039;&#039;&#039;Script kiddie&#039;&#039;&#039; or &#039;&#039;&#039;skiddie&#039;&#039;&#039;&amp;lt;ref name=&quot;Reg01&quot;/&amp;gt; (also known as &#039;&#039;skid&#039;&#039;, &#039;&#039;script bunny&#039;&#039;,&amp;lt;ref&amp;gt;{{cite web |url=http://www.spywareguide.com/term_show.php?id=92 |title=Script bunny - definition |publisher=SpywareGuide.com}}&amp;lt;/ref&amp;gt; &#039;&#039;script kitty&#039;&#039;)&amp;lt;ref&amp;gt;Baldwin, Clare; Christie, Jim (July 9, 2009). [http://in.reuters.com/article/idINTRE5680CC20090709 &quot;Cyber attacks may not have come from North Korea&quot;]. San Francisco; Reuters.com.&amp;lt;/ref&amp;gt; in programming culture  is an unskilled individual who uses scripts or programs developed by others to attack computer systems and networks, and deface websites. It is generally assumed that script kiddies are juveniles who lack the ability to write sophisticated programming programs or exploits on their own, and that their objective is to try to impress their friends or gain credit in computer-enthusiast communities.&amp;lt;ref name=&quot;zdnet&quot;&amp;gt;{{cite web| last=Lemos| first=Robert| date=July 12, 2000 |url=http://www.zdnet.com/script-kiddies-the-nets-cybergangs-3002080125/ &amp;lt;!--http://www.zdnet.com/news/script-kiddies-the-nets-cybergangs/96163--&amp;gt;| publisher=[[ZDNet]]| title=Script kiddies: The Net&#039;s cybergangs| accessdate=2007-04-24}}&amp;lt;/ref&amp;gt; The term is generally considered to be a pejorative.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&#039;&#039;&#039;Script kiddie&#039;&#039;&#039; or &#039;&#039;&#039;skiddie&#039;&#039;&#039;&amp;lt;ref name=&quot;Reg01&quot;/&amp;gt; (also known as &#039;&#039;skid&#039;&#039;, &#039;&#039;script bunny&#039;&#039;,&amp;lt;ref&amp;gt;{{cite web |url=http://www.spywareguide.com/term_show.php?id=92 |title=Script bunny - definition |publisher=SpywareGuide.com}}&amp;lt;/ref&amp;gt; &#039;&#039;script kitty&#039;&#039;)&amp;lt;ref&amp;gt;Baldwin, Clare; Christie, Jim (July 9, 2009). [http://in.reuters.com/article/idINTRE5680CC20090709 &quot;Cyber attacks may not have come from North Korea&quot;]. San Francisco; Reuters.com.&amp;lt;/ref&amp;gt; in programming culture  is an unskilled individual who uses scripts or programs developed by others to attack computer systems and networks, and deface websites &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;(See: [[DDoS]])&lt;/ins&gt;. It is generally assumed that script kiddies are juveniles who lack the ability to write sophisticated programming programs or exploits on their own, and that their objective is to try to impress their friends or gain credit in computer-enthusiast communities.&amp;lt;ref name=&quot;zdnet&quot;&amp;gt;{{cite web| last=Lemos| first=Robert| date=July 12, 2000 |url=http://www.zdnet.com/script-kiddies-the-nets-cybergangs-3002080125/ &amp;lt;!--http://www.zdnet.com/news/script-kiddies-the-nets-cybergangs/96163--&amp;gt;| publisher=[[ZDNet]]| title=Script kiddies: The Net&#039;s cybergangs| accessdate=2007-04-24}}&amp;lt;/ref&amp;gt; The term is generally considered to be a pejorative.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Characteristics==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Characteristics==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Etenne</name></author>
	</entry>
	<entry>
		<id>https://www.boywiki.org/en/index.php?title=Script_kiddie&amp;diff=15658&amp;oldid=prev</id>
		<title>Etenne at 17:47, 23 January 2015</title>
		<link rel="alternate" type="text/html" href="https://www.boywiki.org/en/index.php?title=Script_kiddie&amp;diff=15658&amp;oldid=prev"/>
		<updated>2015-01-23T17:47:17Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 17:47, 23 January 2015&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot;&gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&#039;&#039;&#039;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;script &lt;/del&gt;kiddie&#039;&#039;&#039; or &#039;&#039;&#039;skiddie&#039;&#039;&#039;&amp;lt;ref name=&quot;Reg01&quot;/&amp;gt; (also known as &#039;&#039;skid&#039;&#039;, &#039;&#039;script bunny&#039;&#039;,&amp;lt;ref&amp;gt;{{cite web |url=http://www.spywareguide.com/term_show.php?id=92 |title=Script bunny - definition |publisher=SpywareGuide.com}}&amp;lt;/ref&amp;gt; &#039;&#039;script kitty&#039;&#039;)&amp;lt;ref&amp;gt;Baldwin, Clare; Christie, Jim (July 9, 2009). [http://in.reuters.com/article/idINTRE5680CC20090709 &quot;Cyber attacks may not have come from North Korea&quot;]. San Francisco; Reuters.com.&amp;lt;/ref&amp;gt; in programming culture  is an unskilled individual who uses scripts or programs developed by others to attack computer systems and networks, and deface websites. It is generally assumed that script kiddies are juveniles who lack the ability to write sophisticated programming programs or exploits on their own, and that their objective is to try to impress their friends or gain credit in computer-enthusiast communities.&amp;lt;ref name=&quot;zdnet&quot;&amp;gt;{{cite web| last=Lemos| first=Robert| date=July 12, 2000 |url=http://www.zdnet.com/script-kiddies-the-nets-cybergangs-3002080125/ &amp;lt;!--http://www.zdnet.com/news/script-kiddies-the-nets-cybergangs/96163--&amp;gt;| publisher=[[ZDNet]]| title=Script kiddies: The Net&#039;s cybergangs| accessdate=2007-04-24}}&amp;lt;/ref&amp;gt; The term is generally considered to be a pejorative.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&#039;&#039;&#039;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Script &lt;/ins&gt;kiddie&#039;&#039;&#039; or &#039;&#039;&#039;skiddie&#039;&#039;&#039;&amp;lt;ref name=&quot;Reg01&quot;/&amp;gt; (also known as &#039;&#039;skid&#039;&#039;, &#039;&#039;script bunny&#039;&#039;,&amp;lt;ref&amp;gt;{{cite web |url=http://www.spywareguide.com/term_show.php?id=92 |title=Script bunny - definition |publisher=SpywareGuide.com}}&amp;lt;/ref&amp;gt; &#039;&#039;script kitty&#039;&#039;)&amp;lt;ref&amp;gt;Baldwin, Clare; Christie, Jim (July 9, 2009). [http://in.reuters.com/article/idINTRE5680CC20090709 &quot;Cyber attacks may not have come from North Korea&quot;]. San Francisco; Reuters.com.&amp;lt;/ref&amp;gt; in programming culture  is an unskilled individual who uses scripts or programs developed by others to attack computer systems and networks, and deface websites. It is generally assumed that script kiddies are juveniles who lack the ability to write sophisticated programming programs or exploits on their own, and that their objective is to try to impress their friends or gain credit in computer-enthusiast communities.&amp;lt;ref name=&quot;zdnet&quot;&amp;gt;{{cite web| last=Lemos| first=Robert| date=July 12, 2000 |url=http://www.zdnet.com/script-kiddies-the-nets-cybergangs-3002080125/ &amp;lt;!--http://www.zdnet.com/news/script-kiddies-the-nets-cybergangs/96163--&amp;gt;| publisher=[[ZDNet]]| title=Script kiddies: The Net&#039;s cybergangs| accessdate=2007-04-24}}&amp;lt;/ref&amp;gt; The term is generally considered to be a pejorative.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Characteristics==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Characteristics==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Etenne</name></author>
	</entry>
	<entry>
		<id>https://www.boywiki.org/en/index.php?title=Script_kiddie&amp;diff=15657&amp;oldid=prev</id>
		<title>Etenne at 17:45, 23 January 2015</title>
		<link rel="alternate" type="text/html" href="https://www.boywiki.org/en/index.php?title=Script_kiddie&amp;diff=15657&amp;oldid=prev"/>
		<updated>2015-01-23T17:45:59Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 17:45, 23 January 2015&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l13&quot;&gt;Line 13:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 13:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==See also==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==See also==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt; &lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;*[[Anonymous (group)]]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==External links==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==External links==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[Category:Vigilante]]&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[Category:Vigilante]]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Etenne</name></author>
	</entry>
	<entry>
		<id>https://www.boywiki.org/en/index.php?title=Script_kiddie&amp;diff=15656&amp;oldid=prev</id>
		<title>Etenne at 17:45, 23 January 2015</title>
		<link rel="alternate" type="text/html" href="https://www.boywiki.org/en/index.php?title=Script_kiddie&amp;diff=15656&amp;oldid=prev"/>
		<updated>2015-01-23T17:45:12Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 17:45, 23 January 2015&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l16&quot;&gt;Line 16:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 16:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==External links==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==External links==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[Category:&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Draft&lt;/del&gt;]]&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[Category:&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;Vigilante&lt;/ins&gt;]]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Etenne</name></author>
	</entry>
	<entry>
		<id>https://www.boywiki.org/en/index.php?title=Script_kiddie&amp;diff=15655&amp;oldid=prev</id>
		<title>Etenne: /* Characteristics */</title>
		<link rel="alternate" type="text/html" href="https://www.boywiki.org/en/index.php?title=Script_kiddie&amp;diff=15655&amp;oldid=prev"/>
		<updated>2015-01-23T17:43:43Z</updated>

		<summary type="html">&lt;p&gt;&lt;span class=&quot;autocomment&quot;&gt;Characteristics&lt;/span&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 17:43, 23 January 2015&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l2&quot;&gt;Line 2:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 2:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Characteristics==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Characteristics==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;In a &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;[[&lt;/del&gt;Carnegie Mellon&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;]] &lt;/del&gt;report prepared for the &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;[[&lt;/del&gt;U.S. Department of Defense&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;]] &lt;/del&gt;in 2005, script kiddies  are defined as &amp;lt;blockquote&amp;gt;&quot;The more immature but unfortunately often just as dangerous exploiter of security lapses on the Internet. The typical script kiddy uses existing and frequently well known and easy-to-find techniques and programs or scripts to search for and exploit weaknesses in other computers on the Internet—often randomly and with little regard or perhaps even understanding of the potentially harmful consequences.&amp;lt;ref&amp;gt;{{cite web|author=Mead, Nancy R.; Hough, Eric D.; Stehney, Theodore R. III |date=May 16, 2006 |url=http://www.cert.org/archive/pdf/05tr009.pdf |title=Security Quality Requirements Engineering (SQUARE) Methodology  CMU/SEI-2005-TR-009 |format=PDF |work=Carnegie Mellon University, DOD |publisher=CERT.org}}&amp;lt;/ref&amp;gt;&amp;lt;/blockquote&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;In a Carnegie Mellon report prepared for the U.S. Department of Defense in 2005, script kiddies  are defined as &amp;lt;blockquote&amp;gt;&quot;The more immature but unfortunately often just as dangerous exploiter of security lapses on the Internet. The typical script kiddy uses existing and frequently well known and easy-to-find techniques and programs or scripts to search for and exploit weaknesses in other computers on the Internet—often randomly and with little regard or perhaps even understanding of the potentially harmful consequences.&amp;lt;ref&amp;gt;{{cite web|author=Mead, Nancy R.; Hough, Eric D.; Stehney, Theodore R. III |date=May 16, 2006 |url=http://www.cert.org/archive/pdf/05tr009.pdf |title=Security Quality Requirements Engineering (SQUARE) Methodology  CMU/SEI-2005-TR-009 |format=PDF |work=Carnegie Mellon University, DOD |publisher=CERT.org}}&amp;lt;/ref&amp;gt;&amp;lt;/blockquote&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Script kiddies have at their disposal a large number of effective, easily downloadable malicious programs capable of breaching computers and networks.&amp;lt;ref name=&quot;zdnet&quot;/&amp;gt; Such programs have included remote denial-of-service &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;[[&lt;/del&gt;WinNuke&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;]]&lt;/del&gt;,&amp;lt;ref&amp;gt;{{cite book |author=Klevinsky, T. J. ; Laliberte, Scott; Gupta, Ajay |year=2002 |url=http://books.google.com/books?id=31Kis_vaadwC&amp;amp;pg=PA409&amp;amp;lpg=PA409#v=onepage&amp;amp;q&amp;amp;f=false |title=Hack I.T.: security through penetration testing| publisher=[[Addison-Wesley]] |isbn=978-0-201-71956-7}}&amp;lt;/ref&amp;gt; &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;[[Trojan horse (computing)|trojan]]s [[&lt;/del&gt;Back Orifice&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;]]&lt;/del&gt;, &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;[[&lt;/del&gt;NetBus&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;]]&lt;/del&gt;, &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;[[&lt;/del&gt;Sub7&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;]]&lt;/del&gt;,&amp;lt;ref&amp;gt;{{cite web|author=Granneman, Scott |date=January 28, 2004 | url=http://www.theregister.co.uk/2004/01/28/a_visit_from_the_fbi/ |title=A Visit from the FBI - We come in peace |publisher=[[The Register]]}}&amp;lt;/ref&amp;gt; and &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;[[&lt;/del&gt;ProRat&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;]]&lt;/del&gt;, vulnerability scanner/injector kit &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;[[&lt;/del&gt;Metasploit&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;]]&lt;/del&gt;,&amp;lt;ref&amp;gt;{{cite web|author=Biancuzzi, Federico |date=March 27, 2007 |url=http://www.securityfocus.com/columnists/439 |title=Metasploit 3.0 day |publisher=SecurityFocus.com}}&amp;lt;/ref&amp;gt; and often software intended for legitimate security auditing.&amp;lt;ref name=&quot;Rodriguez&quot;&amp;gt;{{Cite web |url=https://www.htbridge.com/publication/the_growing_hacking_threat_to_websites.pdf |title=The Growing Hacking Threat to Websites: An Ongoing Commitment to Web Application Security |last1=Rodriguez |first1=Chris |last2=Martinez |first2=Richard |publisher=Frost &amp;amp; Sullivan |date=September 2, 2012&amp;lt;!--see pdf--&amp;gt; |accessdate=November 30, 2013}}&amp;lt;/ref&amp;gt; A survey of college students in 2010, supported by UK&#039;s &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;[[&lt;/del&gt;Association of Chief Police Officers&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;]]&lt;/del&gt;, indicated a high level of interest in beginning hacking: &quot;23% of &#039;uni&#039; students have hacked into IT systems [...] 32% thought hacking was &#039;cool&#039; [...] 28% considered it to be easy.&quot;&amp;lt;ref&amp;gt;{{cite web|author=Zax, David|date=September 22, 2010|url=http://www.fastcompany.com/1690541/it-security-firm-fear-students|title=IT Security Firm: Fear Students|publisher=Fast Company}}&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Script kiddies have at their disposal a large number of effective, easily downloadable malicious programs capable of breaching computers and networks.&amp;lt;ref name=&quot;zdnet&quot;/&amp;gt; Such programs have included remote denial-of-service WinNuke,&amp;lt;ref&amp;gt;{{cite book |author=Klevinsky, T. J. ; Laliberte, Scott; Gupta, Ajay |year=2002 |url=http://books.google.com/books?id=31Kis_vaadwC&amp;amp;pg=PA409&amp;amp;lpg=PA409#v=onepage&amp;amp;q&amp;amp;f=false |title=Hack I.T.: security through penetration testing| publisher=[[Addison-Wesley]] |isbn=978-0-201-71956-7}}&amp;lt;/ref&amp;gt; &lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;trojans &lt;/ins&gt;Back Orifice, NetBus, Sub7,&amp;lt;ref&amp;gt;{{cite web|author=Granneman, Scott |date=January 28, 2004 | url=http://www.theregister.co.uk/2004/01/28/a_visit_from_the_fbi/ |title=A Visit from the FBI - We come in peace |publisher=[[The Register]]}}&amp;lt;/ref&amp;gt; and ProRat, vulnerability scanner/injector kit Metasploit,&amp;lt;ref&amp;gt;{{cite web|author=Biancuzzi, Federico |date=March 27, 2007 |url=http://www.securityfocus.com/columnists/439 |title=Metasploit 3.0 day |publisher=SecurityFocus.com}}&amp;lt;/ref&amp;gt; and often software intended for legitimate security auditing.&amp;lt;ref name=&quot;Rodriguez&quot;&amp;gt;{{Cite web |url=https://www.htbridge.com/publication/the_growing_hacking_threat_to_websites.pdf |title=The Growing Hacking Threat to Websites: An Ongoing Commitment to Web Application Security |last1=Rodriguez |first1=Chris |last2=Martinez |first2=Richard |publisher=Frost &amp;amp; Sullivan |date=September 2, 2012&amp;lt;!--see pdf--&amp;gt; |accessdate=November 30, 2013}}&amp;lt;/ref&amp;gt; A survey of college students in 2010, supported by UK&#039;s Association of Chief Police Officers, indicated a high level of interest in beginning hacking: &quot;23% of &#039;uni&#039; students have hacked into IT systems [...] 32% thought hacking was &#039;cool&#039; [...] 28% considered it to be easy.&quot;&amp;lt;ref&amp;gt;{{cite web|author=Zax, David|date=September 22, 2010|url=http://www.fastcompany.com/1690541/it-security-firm-fear-students|title=IT Security Firm: Fear Students|publisher=Fast Company}}&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Script kiddies vandalize websites both for the thrill of it and to increase their reputation among their peers.&amp;lt;ref name=&quot;zdnet&quot;/&amp;gt;  Some more malicious script kiddies have used virus toolkits to create and propagate the &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;[[&lt;/del&gt;Anna Kournikova &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;(computer virus)|Anna Kournikova]] &lt;/del&gt;and &lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;[[ILOVEYOU|&lt;/del&gt;Love Bug&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;]] &lt;/del&gt;viruses.&amp;lt;ref name=&quot;Reg01&quot;&amp;gt;{{cite web|author=Leyden, John|date=February 21, 2001|url=http://www.theregister.co.uk/2001/02/21/virus_toolkits_are_skiddie_menace/|title=Virus toolkits are s&#039;kiddie menace |publisher=[[The Register]]}}&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Script kiddies vandalize websites both for the thrill of it and to increase their reputation among their peers.&amp;lt;ref name=&quot;zdnet&quot;/&amp;gt;  Some more malicious script kiddies have used virus toolkits to create and propagate the Anna Kournikova and Love Bug viruses.&amp;lt;ref name=&quot;Reg01&quot;&amp;gt;{{cite web|author=Leyden, John|date=February 21, 2001|url=http://www.theregister.co.uk/2001/02/21/virus_toolkits_are_skiddie_menace/|title=Virus toolkits are s&#039;kiddie menace |publisher=[[The Register]]}}&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Script kiddies lack, or are only developing, programming skills sufficient to understand the effects and side effects of their actions. As a result, they leave significant traces which lead to their detection, or directly attack companies which have detection and countermeasures already in place, or in recent cases, leave automatic crash reporting turned on.&amp;lt;ref&amp;gt;{{cite web|author=Taylor, Josh |date=August 26, 2010|url=http://www.zdnet.com.au/hackers-accidentally-give-microsoft-their-code-339305548.htm?omnRef=NULL |title=Hackers accidentally give Microsoft their code|publisher=ZDNet.com.au}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{cite web|author=Ms. Smith|date=August 28, 2010|url=http://www.networkworld.com/community/node/65571 |title=Error Reporting Oops: Microsoft, Meter Maids and Malicious Code|work=Privacy and Security Fanatic|publisher=[[Network World]]}}&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Script kiddies lack, or are only developing, programming skills sufficient to understand the effects and side effects of their actions. As a result, they leave significant traces which lead to their detection, or directly attack companies which have detection and countermeasures already in place, or in recent cases, leave automatic crash reporting turned on.&amp;lt;ref&amp;gt;{{cite web|author=Taylor, Josh |date=August 26, 2010|url=http://www.zdnet.com.au/hackers-accidentally-give-microsoft-their-code-339305548.htm?omnRef=NULL |title=Hackers accidentally give Microsoft their code|publisher=ZDNet.com.au}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{cite web|author=Ms. Smith|date=August 28, 2010|url=http://www.networkworld.com/community/node/65571 |title=Error Reporting Oops: Microsoft, Meter Maids and Malicious Code|work=Privacy and Security Fanatic|publisher=[[Network World]]}}&amp;lt;/ref&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Etenne</name></author>
	</entry>
	<entry>
		<id>https://www.boywiki.org/en/index.php?title=Script_kiddie&amp;diff=15654&amp;oldid=prev</id>
		<title>Etenne: Created page with &quot;&#039;&#039;&#039;script kiddie&#039;&#039;&#039; or &#039;&#039;&#039;skiddie&#039;&#039;&#039;&lt;ref name=&quot;Reg01&quot;/&gt; (also known as &#039;&#039;skid&#039;&#039;, &#039;&#039;script bunny&#039;&#039;,&lt;ref&gt;{{cite web |url=http://www.spywareguide.com/term_show.php?id=92 |title=S...&quot;</title>
		<link rel="alternate" type="text/html" href="https://www.boywiki.org/en/index.php?title=Script_kiddie&amp;diff=15654&amp;oldid=prev"/>
		<updated>2015-01-23T15:58:28Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;&amp;#039;&amp;#039;&amp;#039;script kiddie&amp;#039;&amp;#039;&amp;#039; or &amp;#039;&amp;#039;&amp;#039;skiddie&amp;#039;&amp;#039;&amp;#039;&amp;lt;ref name=&amp;quot;Reg01&amp;quot;/&amp;gt; (also known as &amp;#039;&amp;#039;skid&amp;#039;&amp;#039;, &amp;#039;&amp;#039;script bunny&amp;#039;&amp;#039;,&amp;lt;ref&amp;gt;{{cite web |url=http://www.spywareguide.com/term_show.php?id=92 |title=S...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;#039;&amp;#039;&amp;#039;script kiddie&amp;#039;&amp;#039;&amp;#039; or &amp;#039;&amp;#039;&amp;#039;skiddie&amp;#039;&amp;#039;&amp;#039;&amp;lt;ref name=&amp;quot;Reg01&amp;quot;/&amp;gt; (also known as &amp;#039;&amp;#039;skid&amp;#039;&amp;#039;, &amp;#039;&amp;#039;script bunny&amp;#039;&amp;#039;,&amp;lt;ref&amp;gt;{{cite web |url=http://www.spywareguide.com/term_show.php?id=92 |title=Script bunny - definition |publisher=SpywareGuide.com}}&amp;lt;/ref&amp;gt; &amp;#039;&amp;#039;script kitty&amp;#039;&amp;#039;)&amp;lt;ref&amp;gt;Baldwin, Clare; Christie, Jim (July 9, 2009). [http://in.reuters.com/article/idINTRE5680CC20090709 &amp;quot;Cyber attacks may not have come from North Korea&amp;quot;]. San Francisco; Reuters.com.&amp;lt;/ref&amp;gt; in programming culture  is an unskilled individual who uses scripts or programs developed by others to attack computer systems and networks, and deface websites. It is generally assumed that script kiddies are juveniles who lack the ability to write sophisticated programming programs or exploits on their own, and that their objective is to try to impress their friends or gain credit in computer-enthusiast communities.&amp;lt;ref name=&amp;quot;zdnet&amp;quot;&amp;gt;{{cite web| last=Lemos| first=Robert| date=July 12, 2000 |url=http://www.zdnet.com/script-kiddies-the-nets-cybergangs-3002080125/ &amp;lt;!--http://www.zdnet.com/news/script-kiddies-the-nets-cybergangs/96163--&amp;gt;| publisher=[[ZDNet]]| title=Script kiddies: The Net&amp;#039;s cybergangs| accessdate=2007-04-24}}&amp;lt;/ref&amp;gt; The term is generally considered to be a pejorative.&lt;br /&gt;
&lt;br /&gt;
==Characteristics==&lt;br /&gt;
In a [[Carnegie Mellon]] report prepared for the [[U.S. Department of Defense]] in 2005, script kiddies  are defined as &amp;lt;blockquote&amp;gt;&amp;quot;The more immature but unfortunately often just as dangerous exploiter of security lapses on the Internet. The typical script kiddy uses existing and frequently well known and easy-to-find techniques and programs or scripts to search for and exploit weaknesses in other computers on the Internet—often randomly and with little regard or perhaps even understanding of the potentially harmful consequences.&amp;lt;ref&amp;gt;{{cite web|author=Mead, Nancy R.; Hough, Eric D.; Stehney, Theodore R. III |date=May 16, 2006 |url=http://www.cert.org/archive/pdf/05tr009.pdf |title=Security Quality Requirements Engineering (SQUARE) Methodology  CMU/SEI-2005-TR-009 |format=PDF |work=Carnegie Mellon University, DOD |publisher=CERT.org}}&amp;lt;/ref&amp;gt;&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Script kiddies have at their disposal a large number of effective, easily downloadable malicious programs capable of breaching computers and networks.&amp;lt;ref name=&amp;quot;zdnet&amp;quot;/&amp;gt; Such programs have included remote denial-of-service [[WinNuke]],&amp;lt;ref&amp;gt;{{cite book |author=Klevinsky, T. J. ; Laliberte, Scott; Gupta, Ajay |year=2002 |url=http://books.google.com/books?id=31Kis_vaadwC&amp;amp;pg=PA409&amp;amp;lpg=PA409#v=onepage&amp;amp;q&amp;amp;f=false |title=Hack I.T.: security through penetration testing| publisher=[[Addison-Wesley]] |isbn=978-0-201-71956-7}}&amp;lt;/ref&amp;gt; [[Trojan horse (computing)|trojan]]s [[Back Orifice]], [[NetBus]], [[Sub7]],&amp;lt;ref&amp;gt;{{cite web|author=Granneman, Scott |date=January 28, 2004 | url=http://www.theregister.co.uk/2004/01/28/a_visit_from_the_fbi/ |title=A Visit from the FBI - We come in peace |publisher=[[The Register]]}}&amp;lt;/ref&amp;gt; and [[ProRat]], vulnerability scanner/injector kit [[Metasploit]],&amp;lt;ref&amp;gt;{{cite web|author=Biancuzzi, Federico |date=March 27, 2007 |url=http://www.securityfocus.com/columnists/439 |title=Metasploit 3.0 day |publisher=SecurityFocus.com}}&amp;lt;/ref&amp;gt; and often software intended for legitimate security auditing.&amp;lt;ref name=&amp;quot;Rodriguez&amp;quot;&amp;gt;{{Cite web |url=https://www.htbridge.com/publication/the_growing_hacking_threat_to_websites.pdf |title=The Growing Hacking Threat to Websites: An Ongoing Commitment to Web Application Security |last1=Rodriguez |first1=Chris |last2=Martinez |first2=Richard |publisher=Frost &amp;amp; Sullivan |date=September 2, 2012&amp;lt;!--see pdf--&amp;gt; |accessdate=November 30, 2013}}&amp;lt;/ref&amp;gt; A survey of college students in 2010, supported by UK&amp;#039;s [[Association of Chief Police Officers]], indicated a high level of interest in beginning hacking: &amp;quot;23% of &amp;#039;uni&amp;#039; students have hacked into IT systems [...] 32% thought hacking was &amp;#039;cool&amp;#039; [...] 28% considered it to be easy.&amp;quot;&amp;lt;ref&amp;gt;{{cite web|author=Zax, David|date=September 22, 2010|url=http://www.fastcompany.com/1690541/it-security-firm-fear-students|title=IT Security Firm: Fear Students|publisher=Fast Company}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Script kiddies vandalize websites both for the thrill of it and to increase their reputation among their peers.&amp;lt;ref name=&amp;quot;zdnet&amp;quot;/&amp;gt;  Some more malicious script kiddies have used virus toolkits to create and propagate the [[Anna Kournikova (computer virus)|Anna Kournikova]] and [[ILOVEYOU|Love Bug]] viruses.&amp;lt;ref name=&amp;quot;Reg01&amp;quot;&amp;gt;{{cite web|author=Leyden, John|date=February 21, 2001|url=http://www.theregister.co.uk/2001/02/21/virus_toolkits_are_skiddie_menace/|title=Virus toolkits are s&amp;#039;kiddie menace |publisher=[[The Register]]}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
Script kiddies lack, or are only developing, programming skills sufficient to understand the effects and side effects of their actions. As a result, they leave significant traces which lead to their detection, or directly attack companies which have detection and countermeasures already in place, or in recent cases, leave automatic crash reporting turned on.&amp;lt;ref&amp;gt;{{cite web|author=Taylor, Josh |date=August 26, 2010|url=http://www.zdnet.com.au/hackers-accidentally-give-microsoft-their-code-339305548.htm?omnRef=NULL |title=Hackers accidentally give Microsoft their code|publisher=ZDNet.com.au}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{cite web|author=Ms. Smith|date=August 28, 2010|url=http://www.networkworld.com/community/node/65571 |title=Error Reporting Oops: Microsoft, Meter Maids and Malicious Code|work=Privacy and Security Fanatic|publisher=[[Network World]]}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
&lt;br /&gt;
==External links==&lt;br /&gt;
&lt;br /&gt;
[[Category:Draft]]&lt;/div&gt;</summary>
		<author><name>Etenne</name></author>
	</entry>
</feed>