0% found this document useful (0 votes)
45 views7 pages

Presented By: Amit Pokharna Roll No. - 16EEBCS010

The document discusses keystroke logging, which involves a program recording all keystrokes on a computer. The program runs in the background and logs keystrokes, which are then hidden on the machine or sent to an attacker remotely by uploading to a website, emailing, or wireless transmission. The presenter plans to implement a keystroke logging program in C++ that can log keys independently of language settings, send logfiles encrypted via email every 12 hours, and include a program to decrypt the logfiles. Keystroke logging has pros like parental or employer monitoring of computer usage, but cons include potential privacy violations and access to critical system data if installed on the wrong machine.

Uploaded by

Amit jain
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
45 views7 pages

Presented By: Amit Pokharna Roll No. - 16EEBCS010

The document discusses keystroke logging, which involves a program recording all keystrokes on a computer. The program runs in the background and logs keystrokes, which are then hidden on the machine or sent to an attacker remotely by uploading to a website, emailing, or wireless transmission. The presenter plans to implement a keystroke logging program in C++ that can log keys independently of language settings, send logfiles encrypted via email every 12 hours, and include a program to decrypt the logfiles. Keystroke logging has pros like parental or employer monitoring of computer usage, but cons include potential privacy violations and access to critical system data if installed on the wrong machine.

Uploaded by

Amit jain
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 7

Presented by: Amit Pokharna

Roll No. -16EEBCS010

Department of Computer Science and


Engineering
What is keystroke
logging?
A keylogger is a program that runs in the background or hardware,
recording all the keystrokes. Once keystrokes are logged, they are
hidden in the machine for later retrieval, or shipped raw to the attacker
Remote access software keyloggers can allow access to
locally recorded data from a remote location. This
communication can happen by using one of the following
methods:
Uploading the data to a website, database or FTP server.
Periodically emailing data to a predefined email address.
Wirelessly transmitting data through an attached hardware
system.
Software enabling remote login to your local machine.
I will implement this project in C++.

It can even record independent of the language settings because it


logs the physical keys on the keyboard first. Next, by using an
arbitrary keymap with human friendly names, it translates the machine
keys to something that we can understand.

It will possess mail sending capabilities so we can just schedule the
logfile to be sent via mail, lets say every 12 hours.

In addition to this, I will also keep the logfile encrypted. Therefore
another program can be made which will be able to decrypt the logfile
on your end.
Software Key Logging
 Easy to implement – code is relatively normal.
 Hard to install – user can notice the presence of
it.
Pros and Cons

•Parent monitoring child’s computer


usage
•Boss monitoring employee’s computer
usage
•Government retrieving information
pertinent to a crime.
Pros and Cons (contd.)

Most keyloggers show no signs of any


intrusion within the system allowing for them
to gain typed information without anyone
having knowledge of its actions except for the
user who installed it. With the proper
keylogger installed on the correct machine a
person could easily gain access to a company’s
entire network infrastructure. In terms of
system critical data or extremely privileged
information this could cause problems for a
vast amount of people very quickly.
THANK YOU

You might also like