Ok... So the post subject caught my attention, but WTH does it have to do with the actual post???
That aside, nmap is NOT a script kiddie tool, and most every pentester I know will use it, at appropriate times. I think it's safe to say that we've discussed script kiddies plenty of times on EH, and given opinions on the same. Ultimately, IMHO, what makes a script kiddie is the lack of knowledge of what an underlying tool ACTUALLY does, in terms of OSI layers, protocol stacks, and real 'technicalities,' and assumes that just running canned scripts / tools will always yield results. A script kiddie, for instance, doesn't really understand things like timing options in an nmap scan, and what effects they have with regard to stealth, not killing a target system, or how different types of scans actually accomplish their fingerprinting, at a technical level of understanding.
Now is that ALL there is to my definition? No. But this could be a LONG post if I continued. I think the above is a good generalization, though.
~ hayabusa ~
"All men can see these tactics whereby I conquer, but what none can see is the strategy out of which victory is evolved." - Sun Tzu, 'The Art of War'
OSCE, OSCP , GPEN, C|EH