Batch 23
Batch 23
A
MINI PROJECT ON
• In many companies now-a-days data security and data recovery is the most
important factor. So there are many cases where data recovery is required. For
these kinds of problems key capture is one of the best solutions which is often
referred to as key capturing or keyboard capturing.
• Aside from being utilized for vindictive purpose like gathering account data,
Visa numbers, client names, passwords, and other private information, it can
be used in office to check on your employees, at home to monitor your
children’s activities. The software that we are going to build should monitor
the keyboard movement and stores the output in a file.
INTRODUCTION
Hardware Key Capture Stand-alone Edition: A tiny hardware device that can be
attached in between a keyboard and a compute
Hardware Key Capture Keyboard Edition: looks and behaves exactly like a
normal keyboard, but it keeps a record of all keystrokes typed on it.
Key Ghost Hardware Key Capture: A tiny hardware device that can be attached
in between a keyboard and a computer.
KeyKatcher Keystroke Capture: A tiny hardware device that can be attached in
between a keyboard and a computer.
PROPOSED SYSTEM
The basic idea of the project is to create a key capture using python.
We will be using a module which is named as pynput module which we have
installed in our system.
The file has some malicious attributes which can enable access to our keyboard
and make a copy of the keys which we are pressing.
It actually catches the press and release of a key and its time so that it can know
how many times is that key pressed.
The keys presses are stored as a log file which is basically a text document.
The administrator can have access to the file whenever he wants.
The program stops if an “esc” key is pressed.
The solution is that we can build a software keycaptures instead of hardware
keycaptures. The proposed model provides the solution that reduces the
difficulties while installing the keycaptures in target system and this cannot be
detected easily. Since, software keycaptures can be installed remotely and does
not need any physical access of the target system. Proposed software key
capture is efficient enough to get installed in targeted system by itself when the
user for example clicks the malicious link sent to him through mail or any
social media and finally captures all the keystrokes of the user while he is
logged into the system, saves the logs in a file and the third party can easily
have access to the file.
SYSTEM ARCHITECTURE
Functional Requirements
Key Stroke: The keylogger must accurately capture all keystrokes entered by the user.
Timestamp Logging: Each keystroke must be logged with an accurate timestamp.
Log file Management: Captured keystrokes should be stored in log files.
Data Encryption: Log files containing keystroke data must be encrypted.
Real-Time Data Transmission: The keylogger should support the automatic real time files.
User Privacy : The keylogger must include features that ensure ethical use, including activites.
Stop Mechanism: The keylogger should include a feature to stop its operation.
Non Functional Requirements
Performance: The keylogger must operate efficiently with minimal impact on system
performance.
Scalability: The keylogger should be scalable to handle different volumes.
Security: The system must implement robust security measures, including secure data
storage,
Usability: Provide an intuitive and user-friendly interface for all user types.
Availability: Maintain high system availability with minimal downtime.
Reliability: The keylogger must operate stealthily, avoiding detection by antivirus
programs.
Backup and Recovery: Implement robust procedures to protect data integrity and
ensure service continuity.
UML DIAGRAMS
The project highlights the importance of incorporating robust security measures, such as encryption, to
protect the logged data from unauthorized access, ensuring that the keylogger can be used responsibly and
ethically. The keylogger’s ability to be deployed remotely and operate across multiple platforms makes it a
powerful tool for legitimate purposes, such as monitoring authorized users in corporate environments or for
cybersecurity research.
However, it also underscores the need for careful consideration of ethical and legal implications, as misuse
could lead to significant consequences. Despite the technical sophistication of the project, it also highlights
important ethical considerations. Keyloggers, while useful in legitimate scenarios, can easily be misused for
malicious purposes.
REFERENCES
[1].System Scrutinizer a Key Component in Next-Gen Operating Systems: White,
E. (2023).
[2].G.Karagiannis,M.Saeed,P.Papotti.Scrutinizer:https://github.com/
geokaragiannis/2020.
[3]. A Reference-Based System for Scrutinizing Cyber-Physical Systems by M. A.
Akbar et al., published in IEEE Access, vol. 6, pp. 4811-4823, Dec. 2017.