Sunteți pe pagina 1din 13

KEYLOGGER

K EY ST ROK E
L OG G ER FOR ACT IVI T Y
T RACK ING

Project Guide:Prof. Chinmay Raut


Project Members:Prasad Gurav
Samuel Nadar
Tejas Patel

Problem Statement
Parental control: parents can track what their children do on the

Internet, and can opt to be notified if there are any attempts to


access websites containing adult or otherwise inappropriate
content.
Company security: tracking the use of computers for non-workrelated purposes, or the use of workstations after hours.
Company security: using keyloggers to track the input of key
words and phrases associated with commercial information which
could damage the company (materially or otherwise) if disclosed.
Other security (e.g. law enforcement): using keylogger records to
analyze and track incidents linked to the use of personal
computers.

Motivation
Institute or organization are unaware of the activities going on

in their systems .
This kind of activities might be illegal or a threat to the
confidential data, which can cause trouble to the Institute or
organization.
Installing hardware keystroke logging to every system
becomes expensive and it is not very reliable.
Also hardware type key logger can be easily detected and are
risky
Other approach for this is software based which is easy to
implement and it does not conatain the risks that are faced in
the hardware approach

Proposed System
Fully UnDetectable (FUD) software
Deletes captured data from victims PC automatically

Modules
active window
screen capture
sending logs to remote location via mail

Development Tool
Python
Python is a widely used general-purpose, high-level
programming language.
Python supports multiple programming paradigms,
including object-oriented, imperative and functional
programming or procedural styles.

Design

System Architecture

Algorithm Details
Create an Empty log file for storing key logs.
Intercept keys pressed by user.
Store these intercepted values in file.
Hide the Running Window Dialog to make it undetectable.
Use while loop to make it running in all conditions.
Add function to reduce the CPU usage to 0%.

Algorithm
Simple python based Algorithm:1. Take LOG_TIME as counter to count time interval
2. if time_interval = LOG_TIME
3. then
4. Img = ImageGrab.grab()
5. save image with .jpg extention
6. smtplib.SMTP('<smtp name>:<port number>')
7. LOG_TOSEND = sendmail(<id> , <password> ,
<data>)
8. if len(LOG_TOSEND) < 1: return True

Future Scope
Smartphone based application can be added.
Unauthorized user can be restricted from accessing

the system.
Onscreen Keyboard activities tracking

Conclusion
To stop all the illegal activities which can cause

serious threat to the system and keep track of the


activities going on the system.

Thank you

S-ar putea să vă placă și