Best State of Art IT Security Solutions
The best Innovative and powerful IT Security products

Encyclopedia /

What is a Script Kiddie?

Script kiddie is commonly heard when talking about hacker culture. Other terms that are used interchangeably with script kiddie are the following: skiddie, skid, script kitty, script bunny, and script-running juvenile (SRJ). This is a, rather, offensive term utilized in order to name the individuals who make use of programs and scripts that are created by other experts in instigating an assault against various networks and computer systems.

Cracker of Security Systems

Script kiddie was originally coined by the more refined crackers of the security system of machines. The name was invented for the purpose of labeling the individuals who are still in the process of learning. The script kiddies are considered to be at the same level with the treacherous exploiters of the holes in the security of the Internet.
More than usual, script kiddies utilize the programs or scripts on hand as well as the distinguished techniques for the purpose of finding and abusing the vulnerabilities of a machine. These immature individuals do not realize and consider that using these pre-made scripts also has equivalent probable damaging results.

Underdeveloped People

Those who are known to be experts in hacking spew words of disapproval when regarding the said script kiddies. They believe that these entities do not provide anything that can contribute to the progress of the art of hacking. In addition, the hackers think that these underdeveloped people only make situations worst by infuriating the authority. The resentment of the security authorities does not only affect the script kiddies but also the whole hacker community.
Hackers are very much particular with the things that they do. When they execute an attack, they make it to a point that no traces of the illegal access will be left. Script kiddies are the complete opposites of these highly-knowledgeable hackers.
Script kiddies usually seek for the quantity rather than the quality of the attacks that they initiate. They believe that they can get the spotlight towards themselves by showing the world that they have generated large number of assaults. But then, the media depicts these individuals as teenagers who are too bored and are in need of just a little attention from their friends.
 Vulnerability Scanner - Vulnerability Management 

➤ Related pages
All Modules Included at 1 Price
Attack on Exchange Server?
Cross-site Request Forgery
Encyclopedia Part 2
Encyclopedia Part 3
Encyclopedia Part 4
Encyclopedia Part 5
Encyclopedia Part 6
Encyclopedia Part 7
Hyper V Virtual UTM Appliance
Sec-Point
Security Point
VPN Firewall
What is a 2.4 GHz Wi-Fi?
What is a Script Kiddie?
What is a Web Application Firewall?
What is an Elite Hacker?
What is ComboFix?
What is Denial-of Service Attack?
What is Diffie-Hellman Encryption?
What is ISSAP?
What is ISSMP?
What is Penetration Test?
What is RC4 Encryption?
What is Spanning Tree Protocol?
What is the 5.8 GHz Wi-Fi?
What is Tunneling Protocol?
What is War Dialing?
WiFi Pen Test Appliance
Windows Operating System
WPA2 Encryption

Powerful UTM Firewall, Vulnerability Scanner, WiFi Penetration Testing software

SecPoint is specialized to deliver the best IT security solutions and products.

Compatible with Product
Securely protected by SecPoint
Customer reference King Customer reference New York Customer reference ROC Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef Customer reference King Customer reference New York Customer reference Roc Customer reference Rochdale Customer reference Roscrea Customer reference Tradetracker Customer reference Unicef