harshnew (1)
harshnew (1)
in
FIMT- SCHOOL OF IT
By
Harsh Verma
01090102022
FIMT- SOIT
YEAR – 2024
TABLE OF CONTENT
1. INTRODUCTION 1
2. OBJECTIVES 2
4. METHODOLOGY 3
6. REFERENCE 5
Introduction
A Key Logger is a software tool designed to capture and record the keystrokes entered on a
computer's keyboard. Often used for security monitoring or troubleshooting, it serves as a
surveillance tool to track user input for various purposes, such as studying user behaviour,
ensuring compliance, or detecting unauthorized access. This project aims to create a Key
Logger using Python, showcasing the powerful capabilities of the language for system level
programming while emphasizing its ethical use in cybersecurity.
Problem Statement: In today’s digital age, monitoring activities on computers has become a
critical task, especially in security-sensitive environments like businesses or educational
institutions. Tracking unauthorized access, ensuring compliance, or simply monitoring
productivity can be complex without the right tools. A Key Logger addresses these
challenges by providing real-time tracking of keystrokes. However, the ethical implications
make it important to focus on responsible usage.
Why this Topic was Chosen: This topic was chosen because Key Loggers play a vital role
in cybersecurity and digital forensics. By developing this project, I aim to understand the
intricacies of system monitoring and the ethical considerations involved in creating such
surveillance
1
Objective & Future Scope
Objective: The primary objective of this project is to develop a Python-based Key Logger
that can efficiently capture and record keystrokes on a computer, while ensuring minimal
system impact. The project aims to achieve the following:
Future Scope of the Project: The project’s scope extends beyond simple keystroke logging.
With advancements in machine learning, future iterations of this project could analyze typing
patterns to detect suspicious behaviour or create intelligent monitoring systems. Moreover,
integration with cloud services could allow for remote monitoring, expanding its application
to enterprise environments for security purposes. The project could also be extended to
mobile platforms, offering cross-device monitoring solutions.
2
Methodology
This section outlines the entire software system, from development to execution. The Key
Logger is built using Python, a flexible and powerful programming language that offers a
wide range of system interaction libraries.
• Data Capture: The Key Logger captures keyboard inputs in real-time by hooking
into system events using Python libraries like pynput or keyboard.
• Data Storage: Once keystrokes are recorded, they are stored in a local log file, which
can be encrypted for security.
• Data Retrieval: The stored data can be reviewed by an authorized individual for
monitoring purposes.
• Ethical Considerations: The system will ensure that only authorized users can access
the logs, and the tool is used only in legal and ethical contexts.
Flowchart/DFD: [Insert a simple flowchart or Data Flow Diagram (DFD) here to represent
how keystrokes are captured and processed.]
3
Tools and Technologies
Hardware:
• A standard desktop/laptop computer with a working keyboard.
• Sufficient RAM (minimum 4 GB) to support smooth operation.
Software:
Testing Technologies:
4
References
[List your references here, including textbooks, articles, websites, or Python documentation
used during the development of the project.]