Please examine the following passage from the "Know Your Enemy" article: .
"Scan the Internet for a specific weakness, when you find it, exploit it. Most of the tools they use are automated, requiring little interaction. You launch the tool, and then come back several days later to get your results. No two tools are alike, just as no two exploits are alike. However, most of the tools use the same strategy. First, develop a database of IPs that can be scanned. Then, scan those IPs for a specific vulnerability" (Spitzner, 2000).
The former paragraph illustrates script kiddies" common methods of attack. The attacks exhibit a trend comparable to juvenile delinquency. For example, Artec's boredom led him to vandalize the Department of Transportation's web site. He was not concerned with how he achieved the objective or what tools he would have to use in order to deface the web site. Artech was not certain what he wanted to accomplish, but found vulnerability in the web site's security, and exploited its weakness. In his case, he chose to vandalize the web site. Artech exemplifies the mentality of script kiddies throughout the world.
In contrast, crackers pose a significantly greater threat to the Internet community. Crackers usually get confused with hackers, which is a term that describes a proficient computer user. "The cracker is not only someone involved with criminal computer activities, but someone in an environment that does not adhere to rules or ethics unlike Hackers" (Foltz, 2002). Crackers are computer users who attempt to manipulate or destroy information or equipment. They possess extensive knowledge of operating system vulnerabilities, develop their own tools for cracking, and exhibit malicious intent on specific targets with specific objectives. The objectives are significantly more threatening than script kiddie attacks due to their malicious, direct, and skillful manner.