0% found this document useful (0 votes)
361 views6 pages

Advanced Keylogger For Ethical Hacking

This document discusses an advanced keylogger that can be used for ethical hacking purposes. Keyloggers are described as malware that tracks a user's keystrokes secretly in order to record sensitive data like passwords and transmit it to unauthorized parties. The keylogger discussed in this document uses string matching algorithms to match characters from the input device like a keyboard in order to monitor user activity more efficiently and quickly. Motivations for developing such a keylogger include using it to detect hackers by monitoring their keystrokes when performing intrusions on networks or in honeypots.

Uploaded by

Anagha M
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
361 views6 pages

Advanced Keylogger For Ethical Hacking

This document discusses an advanced keylogger that can be used for ethical hacking purposes. Keyloggers are described as malware that tracks a user's keystrokes secretly in order to record sensitive data like passwords and transmit it to unauthorized parties. The keylogger discussed in this document uses string matching algorithms to match characters from the input device like a keyboard in order to monitor user activity more efficiently and quickly. Motivations for developing such a keylogger include using it to detect hackers by monitoring their keystrokes when performing intrusions on networks or in honeypots.

Uploaded by

Anagha M
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/343543281

ADVANCED KEYLOGGER FOR ETHICAL HACKING

Article · May 2020


DOI: 10.33564/IJEAST.2020.v05i01.112

CITATIONS READS

0 331

4 authors, including:

Sarita Yadav
Bharatividyapeeth's college of Engineering, New Delhi
10 PUBLICATIONS   7 CITATIONS   

SEE PROFILE

All content following this page was uploaded by Sarita Yadav on 06 August 2022.

The user has requested enhancement of the downloaded file.


International Journal of Engineering Applied Sciences and Technology, 2020
Vol. 5, Issue 1, ISSN No. 2455-2143, Pages 634-638
Published Online May 2020 in IJEAST (http://www.ijeast.com)

ADVANCED KEYLOGGER FOR ETHICAL


HACKING
Sarita Yadav, Anuj Mahajan, Monika Prasad, Avinash Kumar
Department of IT
BVCOE, New Delhi, Delhi, India

Abstract— Data Security professionals work each day to comprehend what clients are doing. Information caught
taking care of security issues and taking care of dangers. incorporate passwords, client IDs, archive substance, and
These specialists attempt to keep away from new security other basic data [2]. Keylogging is imperceptible as it runs in
dangers, however, the attackers are attempting to discover secrecy mode. These keyloggers can't be distinguished by
new infiltration strategies and refined assaulting numerous Anti-Malware programs running on the device. The
techniques to discredit PCs. The quantity of these client has no real way to recognize the nearness of keyloggers
attackers is expanding in the PC world today. The on his device.
utilization of keylogger is being utilized for distinguishing
and logging what intruders are doing when performing II. MOTIVATION
advances. The keylogger can log the entered keystrokes on
This area is about the inspiration for this project,
hosts, for example, remote frameworks and in honeypots.
keylogger, and significance around that subject. All the
Accumulating keystrokes is a significant advance towards accompanying articles contain distinctive virtual advancements
getting programmers and obtain information about the [11][18][19], assaults that are referenced beneath give
advances. The keylogger can record all exercises identified enthusiasm for making a proposition of issue proclamations to
with the accentuation on the console keys or action on the comprehend. There are two fascinating cases around the
working framework. String coordinating is a strategy for subject keylogger, found in papers on the Internet. One study
coordinating characters from the info procedure like a from the year 2005 and the other from 2014, that bestows that
console, and this coordinating procedure is finished by keyloggers are utilized for quite a while now.
confirming each approaching character. The utilization of
string-coordinating calculations on keylogger applications In February 2005, Joe Lopez, an agent from Florida,
documented a suit against Bank of America later unknown
used to screen client action makes it increasingly agreeable
programmers took 90,000 Dollars from his Bank of America
and quicker. account.
An examination indicated that Mr. Lopez's PC was tainted
I. INTRODUCTION with a wicked program. Coreflood, which records each key
Malware is named by various names, Such as pernicious stroke and transmits this data to harmful clients utilizing the
code, malignant programming. Numerous characterize Internet. This is the way the programmers got hold of Joe
malignant code as "any code included, adjusted, or erased Lopez's client name and secret word.
from a product framework to deliberately cause hurt or During February 2014 there was an article in www.nrk.no
destabilize the planned capacity of the framework". Key which read that the Norwegian Police Security Service (PST)
loggers [21] are getting progressively varied, repulsive, approach lawmakers for consent to introduce approaches to
current, and progressively hard to identify by anti-virus and screen information consoles of individuals they have at the
against keyloggers dependent on signature examination. center of attention. This could be accomplished by introducing
Keylogger is a malware [12] that tracks the client's composed a legitimate keylogger covertly on the distant computer to log
keystroke on the console. The goal of the keylogger is to keystrokes.
covertly record classified data of the client's contribution Keylogging has grown a built-up apparatus utilized by
through keystroke observing [8] and afterward passing this aggressors for obtaining passwords and other classified
significant data to other people. The console is the central information. For programmers, yet besides for others, for
technique for contributing printed and numerical data on the example, departmental heads for frameworks, recognizing
PC through creating. Ordinarily, there is no knowledge dubious movement [4][6]. In investigating, for various
achieved in keylogger, however, logs offer data about every territories, for example, for a look into by guardians for
console occasion and applications that clients clicked or checking their youngsters and recognizing uncommon practices
composed. Regardless of the absence of data on what and to distinguish lawbreakers. Keyloggers can likewise be a
application is utilized, logs give enough data that permits one helpful apparatus to distinguish assaults and their instruments.

634
International Journal of Engineering Applied Sciences and Technology, 2020
Vol. 5, Issue 1, ISSN No. 2455-2143, Pages 634-638
Published Online May 2020 in IJEAST (http://www.ijeast.com)

The inspiration for this venture is to discover whereby to a character or control code. Key codes are regularly CTRL-
keylogging functions under various advances and set up a or ALT-mixes.
honeypot to log the keystrokes, entered as orders by the clients.
With the reason to survey precisely what the clients are doing. The console's memory support incidentally stores the
This instrument will screen which strategy will be utilized. deciphered character or control code and afterward sends it to
This may likewise prompt fruitful cooperation with the the PC's console interface. The console controller gets the
approaching console information and advances it to the
programmer, to identify keystrokes that may get ready against
such assaults later on. working framework. A console driver is regularly practiced to
deal with this piece of the procedure. The working framework
forms the console information dependent on the present
III. SOLUTION APPROACH condition of the Operating System and programs.
In all exchange businesses nowadays, work areas and IT Some principal techniques to create keylogger frameworks:
divisions are a monster and reveling framework. The "Windows Keyboard Hook" strategy, the "Keyboard State
Representatives in all divisions from HR to program progress Table" strategy, and the "Kernel-Based Keyboard" [9].
anticipate a figuring gadget as well as system connector to Initially, the Windows Keyboard Hook strategy dependent on
carry out their responsibilities easily. Indeed, even the the OS that gives a few capacities to Hook-based keyloggers
individuals in the field are expected to hold a work area or a for checking the console. At the point when a key is squeezed
few types of handheld gadgets to transmit data. This way to the Operating System records the activity and registers the
deal with the field has presented an amount of ongoing application itself. Following all information moving in this
assurance related subject to the work drive. One of the instrument is affirmed by the application before heading off to
significant issues incorporates the producer's business to keep the first objective that gets the message. Our keylogger uses
authority over InfoTech and instructive organizations assets these same methods to catch key strokes.
which give staff a chance to quietly execute their private
occasions. There are over a hundred altogether unforeseen
measurements these days that may let associations notice what
their representatives demonstrate at the particular employment
on their work areas, of their email and on the web [20]. In any
case, what do such insights decently speak to? What do
associations watch out for client/worker electronic message,
web, and PC usage genuinely resemble? You have to screen
your representatives, the idea of keyloggers is fundamentally
significant. This keylogging venture catches and records all
keys where the keystrokes had been squeezed. Utilizing this,
we hold onto all information in literary substance.

Figure 2: Global Hook vs Local Hook

Some particular kinds of hooks identified with windows


communication: Global hook controls framework broad
information and local hook screen application-explicit
message. Console hooks are:

Figure 1: Client-Server Method


1) Competent in perusing all console messages and move
them into the following hook strategy in a series.
A console comprises a network of paths overlapped 2) Ready to change the initial information and relinquish it
including keys. This grid of circuits, identified as a key matrix, to the following hook method.
can contrast between console makers. Nonetheless, the
important codes that are transmitted by the console interface to 3) Capable to intrude on the progression of the information
a particular working framework are consistently the equivalent. by not transferring it to the following hook strategy.
At the point when the client presses a key, a circuit shuts in An equipment keylogger can be spotted easily but difficult
the Fundamental Matrix [10]. The keyboard distinguishes this to spot if a client reviews everything that is associated with a
occasion and catches the circuit area. Utilizing a record put console to the equipment on a PC, however, programming
away in console ROM, the processor interprets the circuit area keyloggers are progressively hard to recognize, in light of the

635
International Journal of Engineering Applied Sciences and Technology, 2020
Vol. 5, Issue 1, ISSN No. 2455-2143, Pages 634-638
Published Online May 2020 in IJEAST (http://www.ijeast.com)

fact that they are programs inside a PC. A decent component to


this and any keylogger implies it remains imperceptible and
difficult to recognize in the present framework. Particularly
when this design is to stow away the keylogger for the clients.

IV. CONCLUSION
We read about several techniques of how the data is
transferred from any client in encrypted form and implemented
the Base 64 encryption technique [1][3]. The applications of
keyloggers for various purposes and in different sectors of
society is understood and taken into account in making of this
project.
To start the keylogger just start the executable file this is
the only file that is required for this keylogger to work.

Figure 5: Keylogger in Task Manager

Figure 3: Keylogger Executable This Keylogger records the keystrokes pressed on a


Windows platform. It stores them locally on the host system.
Existing techniques can fail against advanced keyloggers Even if this file is detected by user it is stored in Encrypted
and how any regular keylogger is detected by any Anti-Virus format [14] as seen below using Base 64.
or Anti-Malware applications. Therefore, an additional effort
has been made to make the keylogger stealth and hidden from
the user and all types of Anti-virus.

Figure 6: Logs on Host Machine

The logs are mailed in this same format so they are


undetectable [7] by any user unless decrypted. For testing and
debugging purposes the executable creates a file named
AppLog.txt stored locally that help us to keep record if the
process was successful or not, if any error occurs, we can
detect it and solve using this log file. The content of log file are
as follows:

Figure 4: Anti Virus Scan

Even by manually checking the Task manger this program


shows up like a default windows application.

636
International Journal of Engineering Applied Sciences and Technology, 2020
Vol. 5, Issue 1, ISSN No. 2455-2143, Pages 634-638
Published Online May 2020 in IJEAST (http://www.ijeast.com)

Figure 9: Decrypted logs

V. REFERENCE

[1] Rahim R. and Ikhwan A. (2016); Study of Three-Pass


Protocol on Data Security International Journal of Science and
Research (IJSR) 5 (pp. 102-104).
[2] Rahim R. (2017); 128 Bit Hash of Variable Length in
Short Message Service Security International Journal of
Security and Its Applications 11 (pp. 45-58).
[3] Siahaan A. P. U. and Rahim R. (2016); Dynamic Key
Matrix of Hill Cipher Using Genetic Algorithm International
Journal of Security and its Applications 10 (pp. 173-180).
[4] Venkatesh R. and Sekhar R. K. (2015); User Activity
Monitoring Using Keylogger Asia Journal of Information
Technology 15 (pp. 4758-4762).
[5] Soni K. K., Vyas R. and Sinhal A. (2014); Importance of
Figure 7: Applog on Host machine String Matching in Real-World Problems International Journal
of Engineering And Computer Science 3 (pp. 6371-6375).
These error codes would help if the log was not sent due to [6] Adhikary N., Shrivastava R., Kumar A., Verma S. K., Bag
any reason. The log files are encrypted and decrypted to
M. and Singh V. (2012); Battering Keyloggers and Screen
provide and additional layer of security. In scenarios where
user manages to get his hands on the logs, he won’t be able to Recording Software by Fabricating Passwords I. J. Computer
understand it as the files are encrypted and can only be Network and Information Security 2012 (pp. 13-21)
decrypted by the system administrator. [7] Dadkhah M., Jazi M. D., Ana-Maria C. and Barati E.
(2014); An Introduction to Undetectable Keyloggers with
The mail that is received on the admin account looks like Experimental Testing International Journal of Computer
this: Communications and Networks 4 (pp. 1-5).
[8] Tuli P. and Sahu P. (2013); System Monitoring and
Security Using Keylogger International Journal of Computer
Science and Mobile Computing 2 (pp. 106-111).
[9] Tian, Donghai, et al. (2017); "An Online Approach for
Kernel-level Keylogger Detection and Defense." J. Inf. Sci.
Eng. 33.2: (pp. 445-461).
[10] Raiu, Costin, and Igor Soumenkov. (2015); "Comparing
the Regin module 50251 and the" Qwerty" keylogger.": 2015.
[11] Santwana, C., K. Sai Aditya, and S. Magesh. (2015);
Figure 8: Mail as Received by admin "Hypervisor based Mitigation Technique for Keylogger
Spyware Attacks." International Journal of Computer Science
After decrypting the encrypted file received in the mail we can see and Information Technologies.
the keystokes of the Host machine. [12] Hoglund, Greg, and James Butler. Rootkits (2006);
subverting the Windows kernel. Addison-Wesley Professional,
(2006).
[13] Acharya, Bibhudendra, et al. (2009); "Image encryption
using advanced hill cipher algorithm." International Journal of
Recent Trends in Engineering 1.1: (pp. 663-667).

637
International Journal of Engineering Applied Sciences and Technology, 2020
Vol. 5, Issue 1, ISSN No. 2455-2143, Pages 634-638
Published Online May 2020 in IJEAST (http://www.ijeast.com)

[14] Coppersmith, Don. (1994); "The Data Encryption


Standard (DES) and its strength against attacks." IBM journal
of research and development 38.3: (pp. 243-250).
[15] Teske, Edlyn. (1999); "The Pohlig–Hellman method
generalized for group structure computation." Journal of
Symbolic Computation 27.6: (pp. 521-534).
[16] Wang, Xiaoyun, et al. (2004); "Collisions for Hash
Functions MD4, MD5, HAVAL-128 and RIPEMD." IACR
Cryptology ePrint Archive 2004: 199.
[17] Raiu, Costin, and Igor Soumenkov. (2015); "Comparing
the Regin module 50251 and the" Qwerty" keylogger.": 2015.
[18] Bobbitt, Jared E., et al. (2006) "Virtual file system." U.S.
Patent No. 7,024,427. 4 Apr.
[19] Uhlig, Rich, et al. (2005); "Intel virtualization
technology." Computer 38.5: (pp. 48-56).
[20] Park, Dae-woo. (2016); "Analysis of Phising, Pharming
and Smishing Spam Mail Trend and Techniques from Other
Countries." International Information Institute (Tokyo).
Information 19.3: 895
[21] Sagiroglu, Seref, and Gurol Canbek. (2009);
"Keyloggers: Increasing threats to computer security and
privacy." IEEE technology and society magazine 28.3: (pp.
10-17).

638

View publication stats

You might also like