0% found this document useful (0 votes)
25 views

Synopsis of Keylogger Stroke

The document discusses keyloggers which are software or hardware tools that can record keyboard input covertly. It describes keyloggers and their uses, including both legitimate purposes like monitoring employees or children, as well as malicious purposes like password theft. The document outlines methods for constructing keyloggers and preventing unauthorized keylogger installation.

Uploaded by

Parvaiz Raina
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views

Synopsis of Keylogger Stroke

The document discusses keyloggers which are software or hardware tools that can record keyboard input covertly. It describes keyloggers and their uses, including both legitimate purposes like monitoring employees or children, as well as malicious purposes like password theft. The document outlines methods for constructing keyloggers and preventing unauthorized keylogger installation.

Uploaded by

Parvaiz Raina
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 12

SYNOPSIS

ON
Keylogger Capture

SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE


AWARD OF THE DEGREE OF

BACHELOR OF TECHNOLOGY

IN

COMPUTER SCIENCE AND ENGINEERING

SUBMITTED BY:-
Parvaiz Ahmad Raina
20-B-CSE-14006
Under the guidance of
Mr. Jasdeep Singh
Mr. Sahilpreet Singh
Professor Department Of Computer Science

RIMT UNIVERSITY, MANDIGOBINDGARH PUNJAB


July-December 2023
CONTENTS

1. Introduction-----------------------------------------------------------------------------------------------------------2

2. Hardware Keylogger-------------------------------------------------------------------------------------------------3

3. Software Keylogger--------------------------------------------------------------------------------------------------4

4. Project Summary-----------------------------------------------------------------------------------------------------5

5. Project Description--------------------------------------------------------------------------------------------------6

6. Keylogger construction---------------------------------------------------------------------------------------------7

7. Data Flow Diagram--------------------------------------------------------------------------------------------------8

8. Hardware Requirements------------------------------------------------------------------------------------------9

9. Software Requirements-------------------------------------------------------------------------------------------10

10.References----------------------------------------------------------------------------------------------------------11
INTRODUCTION
Keystroke logging, also known as keylogging, is simply tracking the keys that are struck on
a keyboard. This can be done in multiple ways using a wide variety of hardware devices or
software. The reason for its large threat to networks and their security is due to its
covertness 4 Chandigarh Polytechnic College nature. Most keyloggers show no signs of any
intrusion within the system allowing for them to gain typed information without anyone
having knowledge of its actions except for the user who installed it. With the proper
keylogger installed on the correct machine a person could easily gain access to a company9s
entire network infrastructure. In terms of system critical data or extremely privileged
information this could cause problems for a vast amount of people very quickly.
Some of the advantages the :-
I) Monitoring employees-Keyloggers are very much used in offices to monitor the activities
of the employees. This is basically done to ensure the employees are using the company’s
resources as intended.
II) Monitoring Kids--Keyloggers are very much used in offices to monitor the activities of
the Kids or teenagers, it can keep a record of their activity .
III) Ethical Hacking-We can use a keylogger on our personal computer to understand how it
actually works and what mistakes we need to avoid in order to prevent our self from getting
into trap.
Hardware Keylogger
It is a device that is used for recording the keystrokes. It starts its applications when it is
been plugged in. Now the information gets stored in the device. So to retrieve the data
hackers/attackers have to physically access that. Now there might be an option to retrieve
the data from the hardware keylogger remotely. The operation of the hardware keylogger
differs from the software keylogger. There might be a chance of the software keylogger get
detected, but the hardware keylogger is undetectable. The hardware keylogger is
undetectable as it can appear as an external device that is attached to the computer. It is not
detectable by the anti-virus, and it is hard to be detectable. It allows the attacker to get to
know the confidential details and more details from the victim.
Advantages of Hardware keylogger
• It is undetectable.
• It is not detectable by the anti-virus.
• They are installed in the back of the computer which people often miss out on.
The disadvantage of Hardware keylogger
• It can acts as a disadvantage if it is found by someone.
• They are physically detectable.
Prevent Hardware Keylogger
• One should have a computer case. The computer case will prevent the access of the
hardware keylogger.
• One should disable the extra USB ports which are not required. Only those ports will be
active which is required for use.
• User/Victim should implement the two-factor authorization step. It will prevent the
attacker/hacker to get access to your account.
Software Keylogger

It is a program that is designed to record any input entered by the user from the keyboard. It
is also used in organizations to troubleshoot some problems related to technology. The key
logger is also used by the family to monitor the activities of the user without the user’s
direct knowledge. This is something that is installed on the hard drive. This type of software
is also called spy software. Now the software keylogger can also be used by parents to
monitor their kids, and it is also used for other activities. This software keylogger may be
better, but it is sometimes detectable and can also be removed by anti-spyware. it is used to
record typed passwords, or credit card numbers, and more. This software keylogger has
some features which enable someone to do screen record and more.
Advantage of a Software-based Keylogger :
1. It can be installed on a system when the victim opens the attachment sent in an email.
2. It gives the advantage of taking snapshots, recording videos, and more.
3. They are not physically detectable.
Disadvantage of a Software-based Keylogger :
1. It sometimes gets detected by Anti-spyware
Prevention of the Software-based Keylogger :
1. The user should perform the two-step authentication.
2. Users should use some encryption software. This encryption software encrypts the word
typed from the keyboard.
Project Summary
A keylogger is a software that records keystrokes or keys that you press on a keyboard.
Passwords, credit card numbers, confidential messages and other information are at risk of
being recorded and retrieved by a cybercriminal when you type them on a keyboard of a
compromised computer. A keylogger basically position itself between the keyboard (or
input device) and the computer’s operating system in order to capture information. It9s
typically designed to operate in a covert manner to avoid detection. Some of the free
keyloggers include KidLogger, Revealer Keylogger and Spyrix Keylogger. These
applications have various features, such as taking the occasional screenshots, recording
audio output, sending the recorded keystrokes to a specified email address, and monitoring
other active apps and visited websites. Many software keyloggers run stealthily, never
showing up in the Task Manager as running applications. hackers can distribute a
keylogger on peer-to-peer networks or include one as a file attachment to a phishing email.
Hackers can exploit browser and operating system vulnerabilities to infect outdated
systems. Basically, methods that hackers use to spread other malicious programs can also be
used to spread keyloggers. A hardware keylogger is typically a USB device with two
connectors. One of the connectors must be plugged to the keyboard, while the other must be
plugged into the computer. In other words, the hardware keylogger sits between the
keyboard and computer to intercept keyboard data being sent to the computer.
Project Description
Keyloggers have a wide variety of uses and can be either hardware-based or software-based.
The main purpose is to log everything that is typed on a keyboard and store it in text files
for later assessment. Everything that is typed will be logged; this includes sensitive
information such as passwords, names, pin numbers, and even credit card numbers. While
keyloggers have many acceptable uses they also have many malicious uses.
Acceptable uses :-
Parent monitoring child’s computer usage. Boss monitoring employee’s computer usage.
Government retrieving information pertinent to a crime .
Malicious uses :-
Cracking passwords. Gaining unauthorized information. Stealing credit card numbers.
Reading sent emails or messages not intended for public viewing. Retrieving secret names.
Stealing account numbers Most associations with keyloggers are much like those with
hackers. Even though there are many beneficial uses to keyloggers the only ones the public
seems to associate with them are the malicious ones.
KEYLOGGER CONSTRUCTION
Keyloggers record every key pressed on the keyboard. By monitoring the paths of the
operating system that the keys go through to reach their destination. By doing so,
keyloggers capture the exact characters you type. With that, it is a great tool to view
sensitive information.
There are many ways on how to use keylogger. Depending on the intention of the person
who deploys keyloggers, it can be a useful or dangerous tool.
Due to the data-stealing capability of keyloggers, hackers use them to steal username and
passwords. They spread malware on the Internet to infect as many computers as possible for
monetary gain. If your computer catches a keylogger, hackers will soon obtain our
username and password. That’s how we use keylogger to steal username and password.
Where as a modern keylogger can record information from the microphone and/or web
camera. In addition to the function of information collection, keylogger can also have
monitoring functions, namely, restrict access to certain sites and/or programs, respond to a
specific keyword typed in the URL bar of the browser or in the messenger window. Thus,
software for covert surveillance and access control is more appropriate name for such a
complex software product.
HARDWARE REQUIREMENTS
We need computer resources with sufficient hardware and the tools installed in.
I. Processor - 1.80 GHz.
II. RAM - 2 GB .
III. Hard Disk - 500 GB.
IV. Network card -10-100 MBPS of Network card.
SOFTWARE REQUIREMENTS
This key logger will be software based program where people can use this for their study
purpose or monitoring there system use. Since it is a software application an IDE will be
used in order to write code and to run them. Among these tools, we need to install latest
version of python in our computers. With the help of these tools, it is possible to implement
a keylogger to a system and maintain a log of pressed keys. In addition to these tools, the
language we will use is Python . Some other required software are :-
Operating System: Windows v10
Virtual Box: Oracle VM Virtual Box
Python Version: Python v3.7.2
Python IDE: VsCode.
References

1. Nyang, DaeHun; Mohaisen, Aziz; Kang, Jeonil (2014-11-01). "Keylogging-Resistant Visual


Authentication Protocols". IEEE Transactions on Mobile Computing. 13 (11): 2566–
2579. doi:10.1109/TMC.2014.2307331. ISSN 1536-1233. S2CID 8161528.
2. Conijn, Rianne; Cook, Christine; van Zaanen, Menno; Van Waes, Luuk (2021-08-24). "Early
prediction of writing quality using keystroke logging". International Journal of Artificial
Intelligence in Education. 32 (4): 835–866. doi:10.1007/s40593-021-00268-w. ISSN 1560-
4292. S2CID 238703970.
3. Use of legal software products for computer monitoring, keylogger.org
4. "Keylogger". Oxford dictionaries. Archived from the original on 2013-09-11. Retrieved 2013-08-
03.

You might also like