Originally, people who researched computer systems and networks were called hackers— those who had a good understanding of computer systems and who were able to identify problems. In the field of web security, hackers are referred to as rule breakers, that is, those who do not like to be restrained and are keen on finding loopholes in the system in order to obtain power to manipulate the system. In modern computer systems, the highest authority in the user mode is the root (administrator), which is also the authority all hackers are eager to have access to. Root to hackers is like bone to dogs.
If the hacker cannot get access to the root, he is not a good hacker. The exploited code can help hackers achieve this goal via a leak. The hackers’ exploit code is known as the exploit. Some hackers are proficient enough to be able to find out or even create exploits, but most are only interested in attacking the system. These hackers are relatively superficial and do not have a deep understanding of computer theory or programming techniques; they only know how to compile codes created by other hackers and therefore have no ability to write codes themselves. These kinds of hackers are called script kids. In the real world, major damages are not caused by hackers but by script kids.