0% found this document useful (0 votes)
115 views17 pages

Synopsis of Keylogger

The document discusses keyloggers, which are hardware or software tools used to monitor keyboard input. It covers hardware keyloggers, software keyloggers, the advantages and disadvantages of each, and how to prevent keyloggers. It also provides project summaries on keylogger construction and describes acceptable versus malicious uses of keyloggers.

Uploaded by

Parvaiz Raina
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
115 views17 pages

Synopsis of Keylogger

The document discusses keyloggers, which are hardware or software tools used to monitor keyboard input. It covers hardware keyloggers, software keyloggers, the advantages and disadvantages of each, and how to prevent keyloggers. It also provides project summaries on keylogger construction and describes acceptable versus malicious uses of keyloggers.

Uploaded by

Parvaiz Raina
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 17

CONTENTS

1 .Introduction----------
-----------------------3
2. Hardware
Keylogger---------------
--------4
3. Software
Keylogger---------------
---------5
4.Project
Summary----------------
-----------6
1|Page
5. Project
Description--------------
----------7
6. Keylogger
construction-------------
------8
7. Data Flow
Diagram-----------------
------9
8.

2|Page
Hardware
Requirements-----------
--------10
9.Software
Requirements-----------
---------1
CONTENTS
1 .Introduction----------
-----------------------3
2. Hardware
Keylogger---------------
--------4
3|Page
3. Software
Keylogger---------------
---------5
4.Project
Summary----------------
-----------6
5. Project
Description--------------
----------7
6. Keylogger
construction-------------
------8
4|Page
7. Data Flow
Diagram-----------------
------9
8.
Hardware
Requirements-----------
--------10
9.Software
Requirements-----------
---------1
CONTENTS

5|Page
1 .Introduction----------
-----------------------3
2. Hardware
Keylogger---------------
--------4
3. Software
Keylogger---------------
---------5
4.Project
Summary----------------
-----------6

6|Page
5. Project
Description--------------
----------7
6. Keylogger
construction-------------
------8
7. Data Flow
Diagram-----------------
------9
8.

7|Page
Hardware
Requirements-----------
--------10
9.Software
Requirements-----------
---------1 CONTENTS

1. Introduction-----------------------------------------------------------------------------------------------------------2

2. Hardware Keylogger-------------------------------------------------------------------------------------------------3

3. Software Keylogger--------------------------------------------------------------------------------------------------4

4. Project Summary-----------------------------------------------------------------------------------------------------5

5. Project Description--------------------------------------------------------------------------------------------------6

6. Keylogger construction---------------------------------------------------------------------------------------------7

7. Data Flow Diagram--------------------------------------------------------------------------------------------------8

8. Hardware Requirements------------------------------------------------------------------------------------------9

9. Software Requirements-------------------------------------------------------------------------------------------10

8|Page
INTRODUCTION
Keystroke logging, also known as keylogging, is simply tracking the keys that are struck on a
keyboard. This can be done in multiple ways using a wide variety of hardware devices or software.
The reason for its large threat to networks and their security is due to its covertness 4 Chandigarh
Polytechnic College nature. Most keyloggers show no signs of any intrusion within the system
allowing for them to gain typed information without anyone having knowledge of its actions except
for the user who installed it. With the proper keylogger installed on the correct machine a person
could easily gain access to a company9s entire network infrastructure. In terms of system critical
data or extremely privileged information this could cause problems for a vast amount of people very
quickly.

Some of the advantages the :-

I) Monitoring employees-Keyloggers are very much used in offices to monitor the activities of the
employees. This is basically done to ensure the employees are using the company’s resources as
intended.

II) Monitoring Kids--Keyloggers are very much used in offices to monitor the activities of the Kids or
teenagers, it can keep a record of their activity .

III) Ethical Hacking-We can use a keylogger on our personal computer to understand how it actually
works and what mistakes we need to avoid in order to prevent our self from getting into trap.

9|Page
Hardware Keylogger
It is a device that is used for recording the keystrokes. It starts its applications when it is been
plugged in. Now the information gets stored in the device. So to retrieve the data hackers/attackers
have to physically access that. Now there might be an option to retrieve the data from the hardware
keylogger remotely. The operation of the hardware keylogger differs from the software keylogger.
There might be a chance of the software keylogger get detected, but the hardware keylogger is
undetectable. The hardware keylogger is undetectable as it can appear as an external device that is
attached to the computer. It is not detectable by the anti-virus, and it is hard to be detectable. It
allows the attacker to get to know the confidential details and more details from the victim.

Advantages of Hardware keylogger

• It is undetectable.

• It is not detectable by the anti-virus.

• They are installed in the back of the computer which people often miss out on.

The disadvantage of Hardware keylogger

• It can acts as a disadvantage if it is found by someone.

• They are physically detectable.

Prevent Hardware Keylogger

10 | P a g e
• One should have a computer case. The computer case will prevent the access of the hardware
keylogger.

• One should disable the extra USB ports which are not required. Only those ports will be active
which is required for use.

• User/Victim should implement the two-factor authorization step. It will prevent the
attacker/hacker to get access to your account.

Software Keylogger

It is a program that is designed to record any input entered by the user from the keyboard.
It is also used in organizations to troubleshoot some problems related to technology. The
key logger is also used by the family to monitor the activities of the user without the user’s
direct knowledge. This is something that is installed on the hard drive. This type of software
is also called spy software. Now the software keylogger can also be used by parents to
monitor their kids, and it is also used for other activities. This software keylogger may be
better, but it is sometimes detectable and can also be removed by anti-spyware. it is used to
record typed passwords, or credit card numbers, and more. This software keylogger has
some features which enable someone to do screen record and more.

Advantage of a Software-based Keylogger :

1. It can be installed on a system when the victim opens the attachment sent in an email.

2. It gives the advantage of taking snapshots, recording videos, and more.

3. They are not physically detectable.

Disadvantage of a Software-based Keylogger :

1. It sometimes gets detected by Anti-spyware

11 | P a g e
Prevention of the Software-based Keylogger :

1. The user should perform the two-step authentication.

2. Users should use some encryption software. This encryption software encrypts the word
typed from the keyboard.

Project Summary
A keylogger is a software that records keystrokes or keys that you press on a keyboard. Passwords,
credit card numbers, confidential messages and other information are at risk of being recorded and
retrieved by a cybercriminal when you type them on a keyboard of a compromised computer. A
keylogger basically position itself between the keyboard (or input device) and the computer’s
operating system in order to capture information. It9s typically designed to operate in a covert
manner to avoid detection. Some of the free keyloggers include KidLogger, Revealer Keylogger and
Spyrix Keylogger. These applications have various features, such as taking the occasional
screenshots, recording audio output, sending the recorded keystrokes to a specified email address,
and monitoring other active apps and visited websites. Many software keyloggers run stealthily,
never showing up in the Task Manager as running applications. hackers can distribute a keylogger
on peer-to-peer networks or include one as a file attachment to a phishing email. Hackers can
exploit browser and operating system vulnerabilities to infect outdated systems. Basically, methods
that hackers use to spread other malicious programs can also be used to spread keyloggers. A
hardware keylogger is typically a USB device with two connectors. One of the connectors must be
plugged to the keyboard, while the other must be plugged into the computer. In other words, the
hardware keylogger sits between the keyboard and computer to intercept keyboard data being sent
to the computer.

12 | P a g e
Project Description
Keyloggers have a wide variety of uses and can be either hardware-based or software-based. The
main purpose is to log everything that is typed on a keyboard and store it in text files for later
assessment. Everything that is typed will be logged; this includes sensitive information such as
passwords, names, pin numbers, and even credit card numbers. While keyloggers have many
acceptable uses they also have many malicious uses.

Acceptable uses :-

Parent monitoring child’s computer usage. Boss monitoring employee’s computer usage.

Government retrieving information pertinent to a crime .

Malicious uses :-

Cracking passwords. Gaining unauthorized information. Stealing credit card numbers. Reading sent
emails or messages not intended for public viewing. Retrieving secret names. Stealing account
numbers Most associations with keyloggers are much like those with hackers. Even though there are
many beneficial uses to keyloggers the only ones the public seems to associate with them are the
malicious ones.

13 | P a g e
KEYLOGGER CONSTRUCTION
Keyloggers record every key pressed on the keyboard. By monitoring the paths of the operating
system that the keys go through to reach their destination. By doing so, keyloggers capture the exact
characters you type. With that, it is a great tool to view sensitive information.

There are many ways on how to use keylogger. Depending on the intention of the person who
deploys keyloggers, it can be a useful or dangerous tool.

Due to the data-stealing capability of keyloggers, hackers use them to steal username and
passwords. They spread malware on the Internet to infect as many computers as possible for
monetary gain. If your computer catches a keylogger, hackers will soon obtain our username and
password. That’s how we use keylogger to steal username and password.

Where as a modern keylogger can record information from the microphone and/or web camera. In
addition to the function of information collection, keylogger can also have monitoring functions,
namely, restrict access to certain sites and/or programs, respond to a specific keyword typed in the
URL bar of the browser or in the messenger window. Thus, software for covert surveillance and
access control is more appropriate name for such a complex software product.

14 | P a g e
15 | P a g e
HARDWARE REQUIREMENTS
We need computer resources with sufficient hardware and the tools installed in.

I. Processor - 1.80 GHz.


II. RAM - 2 GB .
III. Hard Disk - 500 GB.
IV. Network card -10-100 MBPS of Network card.

16 | P a g e
SOFTWARE REQUIREMENTS
This key logger will be software based program where people can use this for their study purpose or
monitoring there system use. Since it is a software application an IDE will be used in order to write
code and to run them. Among these tools, we need to install latest version of python in our
computers. With the help of these tools, it is possible to implement a keylogger to a system and
maintain a log of pressed keys. In addition to these tools, the language we will use is Python . Some
other required software are :-

Operating System: Windows v10

Virtual Box: Oracle VM Virtual Box

Python Version: Python v3.7.2

Python IDE: Vscode.

17 | P a g e

You might also like