What are the guys scripts?
script kiddies are teenagers who use easily available tools that experienced hackers hand over websites or penetrates into computer systems, usually performed for mutual recognition and attention. Kiddies scripts have little or no personal knowledge of hacking and rely on other people's programs or scripts , hence the name "Script Kiddie". They are not considered real hackers, and in the hacker community they look down that they give hackers a bad name by engaging in immature forms of vandalism.
Popular entertainment for children's scripts involves gaining access to the authorization of websites to "mark" sites using electronic graffiti for praise rights. This vandalism practice is known as "cracking on the web". The bored adolescent builds a reputation among friends marking tens or even hundreds of websites.
In addition to the deformation of the website, the script child also uses the remote compromisetacs. The process starts using automated programming scanned computers connected to the Internet and are looking for specific exploits. After identifying vulnerable goals, other tools are used to penetrate the targets. If the goal is a computer that is part of a private network, the entire network is at risk.
The next step includes the installation of "rootkits" on targeted systems so that remote computers are used without knowing the owners. Every compromised computer becomes a "drone" or "zombie computer". More zombies of computers are “botnet”. A remote operator can upload Trojan horses or viruses to botnet, damage computers, steal personal data including credit card numbers and passwords, erase whole hard drives or just sit and quietly survey.
Kiddies scripts normally compete against each other to find out who can build the biggest botnet. Since a zombie computer can be used to search for new Vulny Rable Vulny, Botnets canexponentially put on very large networks consisting of hundreds, thousands or hundreds of thousands of compromised computers. The Kiddie scenario can issue a botnet command that will perform background operations, while innocent users are involved in their business, do not know that their computers are used. With such a force, scripted children can reduce large commercial websites by starting the attacks of distributed denial of the service (DDOS). The site is bombarded by recurring compromised compromised computers in the botnet until the server has over and sees and attacks.
While attacks on cyber vandalism and DDOS may seem funny for bored teenagers, these actions are criminal and can land the scenario of Kiddie in prison. The Canadian teenage Mike Calce caused $ 1.7 million (USD) in February 2000, when the then 15 -year -old started attacks on CNN, eBay, Dell, Inc., E*Trade, Yahoo! and Amazon. The Federal Office for Investigations followed the router protocols that eventually pointed to the POInternet services for teenagers, located in Montreal, Canada. The Canadian police placed the wiretapping on the suspicious phone and arrested arrest after two months of supervision. Calce eventually confessed to 55 counts and was sentenced to eight months at the detention center, received a year of probation and was ordered to pay a fine.
Unfortunately, the scripts guys are not the only ones who are arrested. Their illegal activities are mapped back to compromised computers and implies innocent owners. This may potentially lead to unannounced knocking on the authorities and the legal seizure of your computer, not to mention the arrest (no matter how short). In one reported case, the man was taken into custody when child pornography was found on his computer only when it was found that the files were recorded there without his knowledge of a remote operator.
Legal problems, fraud and thomezing identity theft aside, at least have your computer compromised boys scripts can mean a necessityReformat the drive and rebuild the system. With an average computer that boasts storage of standing gigabytes or more, this is not a small power. If the system is not backed up, its reconstruction from scratch may take days, weeks or even months, and it can also mean losing valuable data. Compromised networks have it even worse.
Because teenagers lack maturity, many scripts do not often realize the serious consequences of their actions. Snoring before rootkits and maintaining safety software will reduce the risk of focusing on script children.