0% found this document useful (0 votes)
25 views9 pages

Cyber

Uploaded by

babulkiid
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views9 pages

Cyber

Uploaded by

babulkiid
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 9

 BABUL BEHERA

[email protected]

 EINSTEIN ACADEMY OF TECHNOLOGY AND MANAGEMENT ,


BANIATANGI,KHORDHA,ODISHA

 INTERNSHIP UNDER OSDA(26TH OCT -10TH DEC 2023)


PROJECT TOPIC
KEYLOGGER CAPTURING KEY STROKES
AGENDA
 A keylogger is a software or hardware tool designed to clandestinely
capture and record every keystroke made on a keyboard. It operates in the
background, logging all typed characters, including passwords, messages,
and other text input, without the user's knowledge.

 we can use it for security monitoring, Parental Control, Law Enforcement,


Cybersecurity, Identity Theft, Spyware.
PROJECT OVERVIEW
 Purpose:
 The primary purpose of a keylogger that captures keystrokes is to monitor and record all keyboard
activity on a computer or device. This tool serves multiple intentions like, Surveillance and
Monitoring, Data recovery

 Scope:
 The scope of a keylogger using keystrokes encompasses various areas like Monitoring and Logging,
Monitoring and Logging.

 Objectives:
 The objectives of using a keylogger that captures keystrokes are specific aims or outcomes to be
achieved like Surveillance and Oversight, Identification of Vulnerabilities,Data Retrieval,
Understanding User Behavior.
 While these objectives can be legitimate and beneficial in specific contexts, it's crucial to recognize
the ethical considerations and legal boundaries associated with using keyloggers, as their misuse
can lead to privacy violations and data breaches.
END USERS OF KEYLOGGER
 Organizations and Employers:
 Companies and organizations might use keyloggers to monitor employee activities on
work computers.
 Parents or Guardians:
 Keyloggers can be utilized by parents or guardians to monitor their children's online
activities, ensuring their safety, guiding appropriate online behavior, and protecting
them from potential risks.
 Individuals for Personal Use:
 Some individuals might use keyloggers for personal purposes, such as monitoring their
own computer activities for security reasons.
 Security Professionals:
 Cybersecurity experts and professionals might use keyloggers as a tool for penetration
testing, vulnerability assessment, and to identify potential security weaknesses in
systems and networks.
 Malicious Actors: Unfortunately, keyloggers can also be utilized by individuals or groups
with malicious intent, aiming to steal sensitive information such as login credentials,
financial data, or personal information for fraudulent activities.
MODELLING
 Clipboard Capturing: Some keyloggers also capture information copied to the
clipboard, which might include sensitive data such as passwords or account
details.
 Screen Logging: This technique captures screenshots at specific intervals or
when certain keystrokes are detected, allowing the capture of visual
information entered by the user.
 Memory Injection: Sophisticated keyloggers can use techniques like DLL
(Dynamic Link Library) injection to monitor and capture keystrokes by
injecting code into the memory space of other processes.
 Browser-Based Keylogging: These keyloggers focus on capturing information
entered into web forms or browsers, often via scripts or browser extensions.
RESULTS
LINK OF PROJECT: https://github.com/Babul1952/keylogger.git
THANK YOU

You might also like