Keylog Final
Keylog Final
“Keylogger Software”
Submitted in partial fulfilment of requirement for the Award of
Post-Graduation Diploma
In
Cyber Security
Project In-charge Head of Department
Mr. Mudresh Mohan Tripathi Mr. P.S Arya
Submitted by
Vikesh Gupta(E23301211500025)
Tarun Kumar (E23301211500023)
Abhishek Gautam (E23301211500002)
We have given due credit to the original author/source for all the words, ideas,
diagrams, graphics, computer programs, experiments, results that are not my original
contributions. We have used quotation marks to identify verbatim sentences and given
credit to the original author/source.
II
Certificate
This is to certify that Vikesh Gupta, Tarun Kumar, and Abhishek Gautam, students of the
Post Graduate Diploma in Cyber Security program at Government Polytechnic, Kanpur,
have successfully completed their project titled "Keylogger Software" under the guidance
of Mr. Mudresh Mohan Tripathi (Project In-charge)and the Head of the Department, Mr.
P.S. Arya.
We commend the students on their dedication, hard work, and technical skills displayed
throughout the project development process.
Signature Signature
It has indeed been a great privilege for us to have Mr. Mudresh Mohan Tripathi,
Department of CS-IT, Government Polytechnic Kanpur, as mentor for this project.His
awe-inspiring personality, superb guidance and constant encouragement are the motive
force behind this project work. We take this opportunity to express us utmost gratitude to
him. We are also indebted to him for his timely and valuable advice.
We are thankful to all technical and non-teaching staff of the Department of CS-
IT for their constant assistance and co-operation.
ABSTRACT
Keyloggers are a type of computer malware that records keystroke events on the keyboard
and saves them to a log file, allowing it to steal sensitive data like passwords. Malicious
software captures usernames, PINs, and passwords as a result. Without drawing the user's
attention, the hacker Keyloggers possess a big threat to both Transactions such as
commercial and personal i.e., E-commerce, online banking, email chatting, and other
similar activities are examples of online activities. An attacker can collect valuable data
without entering into a strong database or file server using this method.
The main purpose of keyloggers is to tamper with the chain of events that occur when a
key is pressed, and information is displayed on the screen as a result of the keystroke.
Keyloggers can be used for both lawful and illegitimate objectives, depending on the user
who is utilising it. Keyloggers for systems, i.e., for identifying fraudulent users, can be
used by system administrators. Keyloggers can help a computer forensics analyst examine
digital files more effectively. Keyloggers are extremely useful for keeping track on
ongoing criminal activity.
TABLE OF CONTENTS
CHAPTER NO. TITLE
ABSTRACT
LIST OF FIGURES
1 INTRODUCTION
1.1 OUTLINE OF THE PROJECT
1.2 APPLICATION
1.2.1 Screen Surveillance
1.2.2 Chat Surveillance
1.2.3 Recording Files/Folders
1.2.4 Reporting via e-mail
1.3 APPLICATION SECURITY
1.4 PROBLEM STATEMENT
1.5 PROBLEM DESCRIPTION
2 LITERATURE SURVEY
2.1 STATE OF ART
2.2 INFERENCE FROM LITRATURE
3 SYSTEM ANALYSIS
3.1 EXISTING SYSTEM
3.2 PROPOSED SYSTEM
3.2.1 Architecture Overview
3.2.2 Workflow of proposed system
3.3 KEY REQUIREMENTS
3.3.1 Design and Implementation
3.3.2 The development process
3.3.3 Observing user data
3.3.4 Sending secret information
3.3.5 Make this software in stealth
mode
3.4 SYSTEM REQUIREMENTS
4 METHODOLOGIES
4.1 Environment
4.1.1 get pass
4.1.2 pynput
4.1.3 Fernet
4.1.4 Socket
4.1.6 Clipboard(win32clipboard)
4.1.7 Time
6 RESULT AND CONCLUSION
We can create a keylogger program using Python to capture the Audio files. The files are
saved in a wav format, and it records all type of audio. You can use a key logger to monitor
activity on your computer.
Another effective detection mechanism is tainted data analysis, which is directly aimed at
kernel-level keyloggers. The majority of kernel-level keyloggers have been found to alter
the usual data flow of a keyboard driver or driver stack in order to capture and transmit
keystroke data. As a result, when data is being transported along the chain of keyboard
device drivers in the kernel, user keystroke data is extracted. The use of networkfirewalls
and routers to allow or refuse network traffic to a local workstation based on a defined
rule set is the most advanced level of prevention. Because they restrict access based on a
broad set of rules, routers often provide less robust preventive capabilities thanfirewalls.
In this section, the literature review of keylogger technology is mentioned. The section is
divided into two major categories i.e. keylogger in Industry, keylogger in education, given
in Sections 2.1 and 2.2 and respectively.
blockchain in Wireless Sensor Networks (WSN), given in Sections 2.1, 2.2 and 2.3,
respectively.
As online education platform is increasing, keylogger can inspire to do hard work. There
may be students who will do their daily work to impress teacher by using internet source.
Knowing they’re being watched will be a motivator to work diligently.
CHAPTER 3
SYSTEM ANALYSIS
The existing model of the current problem statement is the traditional style of transferring
data using keylogger is very costly and not for the small purpose However, we have
keylogger which is basically used for monitoring payments and, PINs, and passwords as a result.
Without drawing the user's attention. A hardware keylogger is a device that connects your
keyboard to your computer. Keyloggers can be connected directly to the keyboard and the
computer through manually using one of two approaches. PS/2 and the USP keylogger are two
examples
Most frequent keyloggers target the keyboard; it comprises of a circuit matrix A key matrix, often
known as a key database, is a database that contains keys. Depending on the keyboard
manufacturer, there are many distinct types of key matrix. When the user pushes a key, the circuit
closes the key matrix, which is detected by the keyboard processor and ROM. The circuit location
is converted to a message or control code by the CPU, which is subsequently delivered to the
keyboard storage. The computer's keyboard controller receives and transmits incoming keyboard
data to the Windows operating system. The data that travels between the operating
The second technique requires the insertion of a keylogger circuit within the keyboard standard
rather than a physical connection to the PC. This strategy has the advantage of not requiring users
to physically monitor keyloggers.
Acoustic keylogger, unlike hardware keyloggers, analyses and records the sound of individual
keystrokes. Special equipment is necessary to listen to the sound of the user's typing. The sound
of the keyboard was picked up from hundreds of feet away using a parabolic microphone, which
was designed to record over a long distance.
Keylogger on the go: -
Bluetooth connections have been used by wireless keyloggers to send information to a log file.
over a distance of up to 100 meters. The main goal of this wireless keylogger is to intercept
broadcast packets from a wireless keyboard that engage a 27MHz RFlink to transfer translated
RF keystroke characters. The disadvantage of this wireless keylogger is that it requires a
receiver/antenna that is somewhat close to the target region to work. Figure 3 depicts a Bluetooth-
enabled keylogger.
Keylogger software: -
Data travelling over the keyboard and through the operating system is intercepted by
softwarekeyloggers. It records keystroke events, saves them in a remote place, and then
sends them to the keylogger's creator. The eradication of spyware parasites revealed a
total of 540 keyloggers, the majority of which were software-based. The operating
system's keyboard driver converts a character pressed on the keyboard or a mouse click
into a window message called WM KEYDOAWN. The machine message queue has been
modified with this message. The message is subsequently placed in the application
thread's message queue, along with the current window on the screen. window operating
system. Interrogation cycle, traps keylogger, rootkits keylogger, and keylogger kernel
mood are the four primary categories of software keyloggers. These classifications are
based on how keyloggers work.
Cycle of interrogation: -
Unhooks Window Hook Ex aids in the removal of the hook by putting a defined hook
technique into a hook chain. The keylogger determines which type of message called the
hook handler when the Set Window Hook Ex function is used.
The GUI programmer receives the first Making hook-and-loop keyloggers for the
keyboard Mechanism is considered a conventional method.
(C). Keylogger Software Rootkits
In contrast to trap software keyloggers, rootkit software keyloggers are the most harmful
sort of keylogger, yet they are rather uncommon. It is a collection of functions that are
responsible for the processing of messages or supplied text. To capture and monitor
messages collected by GUI applications, it contains methods called import get pass,
Translate Message library, and Peek Message dll function. As a result, it effortlessly
intercepts messages and data using a variety of methods and functions.
The fundamental goal of keyloggers is to intercept any two links in the chain of events that
occurs between when a key is hit and when data about a certain keystroke is presented on
the monitor. Surveillance video, a hardware bug in the keyboard, cables, or the computer
itself, intercepting input/output, substituting the keyboard driver, the sensor driver in the
keyboard stack, able to intercept kernel functions by any means possible (substituting
Captures usernames, PINs, and passwords, Monitoring and recording of the clipboard,
Tracking/Program Application, Reporting via e-mail. addresses in system tables,
splicing function code, etc.), intercepting DLL functions in user mode, and, finally,
requesting information from the keyboard using standard documented methods can all be
used to achieve this.
3.3.1 Design and Implementation
The spreading medium, the type of target machine, the keylogger's lifetime, and the level
of silence and footprint left on the machine while active all influence keyloggerred sign
and implementation techniques. A remote injection of a software keylogger attacking an
operating system's user mode, for example, and a physical device deployment of a
hardware keylogger are both common. To ensure proper installation, software
keyloggers require a well-crafted infection method, such as a web browser
vulnerability. The attacker can detect and exploit existing security flawsdepending on
the browser being used
3.3.2 The development process
The above figure represents the various stages how the data are passed to hacker as a
person interact with keyboard.
The capability that will be required to capture keystrokes and mouse events will be
activated. The capacity will capture what the client is typing in the console as well as the
mouse click. It will snap a screenshot of the title of the current window. As a result, the
proprietor of the product will examine all of their information without understanding who
the client of the framework is.
SOFTWARE
METHODOLOGIES
4.1 Environment
Keylogging is utilized for a variety of purposes. It is used to track Internet activity for
company security, parental control, and schools. A keylogger secretly captures everything
you do, including what you type in a word document, emails, online conversations, and
Internet usage. Because a keylogger captures all keystrokes, you maysee the user's name
and password as they put it into a form in plain text. Furthermore, if utilizing secure email
4.1.1.1 Get pass
This function checks the environment variables LOGNAME, USER, LNAME and
USERNAME, in order, and returns the value of the first one which is set to a non- empty
string. If none are set, the login name from the password database is returned on systems
4.1.2Pynput .keyboard
This library allows you to control and monitor input devices
4.1.3.1 Fernet
Fernet assures that a communication encrypted with it cannot be modified or read.
4.1.3.2 Smtplib
Smtplib is a Python package that allows you to send emails using the Simple Mail
Transfer Protocol (SMTP)
4.1.3.3 Socket
A request for the page's text can be sent using the socket s. The response will be read via
the same socket.
4.1.3.4 Clipboard(win32clipboard)
It is utilized to achieve cross-platform copy and pasting in Python. It is a cross- platform
library, making it usable in different operating systems to capture clipboard information.
4.1.3.5 Time
It is used to import real time in the application
CHAPTER 5
5.1 RESULT
Keyloggers span a wide range of topics, including keylogger design and implementation,
legal and ethical issues, real coding, and current activity in this field. These projects are
especially encouraging because they give students a hands-on exposure to software
security programmers. Keyloggers are an important part of today's cybersecurity
education.
CHAPTER 6
6.1 CONCLUSION
Keyloggers are sophisticated tools that can access not only the platform, but also the user's
private information like their name, password, pin, card and bank statement. While some
unlawfully. The most frequent keylogger types and strategies used to hide themselves
while subverting a user's PC were examined in this study. In addition, we looked at the
present situation of keyloggers and the methods through which they spread Finally, we
looked into existing detection methods and made some recommendations for prevention.
6.2 FUTURE ENHANCEMENT
REFERENCES
A. SAMPLE CODE