Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 19

Minor Project Presentation

Topic: Keylogger and PC monitoring system

Project Mentor: Professor Gaurav Saxena


1
Presented by: Divyansh Sengar, Divyansh Gupta
Shantanu Awasthi
2 Contents

 What is Keyloggers
 Groups of Keyloggers
 Requirement Analysis
 Feasibility Study
 Preventions
 Conclusion
3 What is Keylogger

Keylogger is a computer program that records every keystroke made


by a computer user, to gain fraudulent access to passwords and other
confidential information.
Keylogging is also known as Keystroke logging.
It can also be used to study human–computer interaction. 
There are two basic purpose to use Keyloggers.
 To monitor employee performance
 To access confidential information
4 Types of Keyloggers

There are different types of Keyloggers divided into two main groups.
1. Hardware Keyloggers
2. Software Keyloggers
Hardware Keyloggers
5
Hardware Keyloggers are small electronic devices used for capturing the
data in between a keyboard device and I/O port.
Usually these devices have built in memory where they store the keystrokes
so this means they must be retrieved by the person who installed it in order
to obtain the information.
Hardware Keyloggers are undetectable by anti-viral software or scanners
since it works on the hardware platform
6 Hardware-based keyloggers can monitor your activities without any
software being installed at all. Examples of these include:

 Keyboard hardware - These loggers take the form of a piece of


hardware inserted somewhere between the computer keyboard and
the computer, typically along the keyboard's cable connection.
There are of course more advanced implementation methods that
would prevent any device from being visible externally. This type of
hardware keylogger is advantageous because it is not dependent on
any software nor can it be detected by any software.
7 Software keyloggers
Remote- access software keyloggers can allow access to locally
recorded data from a remote location. This communication
can happen by using one of the following
methods:
 Uploading the data to a website, database or FTP server.
 Periodically emailing data to a predefined email address.
 Wirelessly transmitting data through an attached hardware system.
 Software enabling remote login to your local machine.
8 Additional features that some software keyloggers come with can capture
additional information without requiring any keyboard key presses as input.
They include:
 Clipboard logging – Anything that can be copied to the clipboard is
captured.
 Screen logging – Randomly timed screenshots of your computer screen are
logged.
 Control text capture – The Windows API allows for programs to request
the text value of some controls, meaning that your password may be
captured even if behind a password mask (the asterisks you see when you
type your password into a form).
 Activity tracking – Recording of which folders, programs and windows are
opened and also possibly screenshots of each.
9 Requirement Analysis
Daily Report for the Admin:
 The Keylogger will be capable of maintaining daily report of the
activities done on the PC, which includes images and text files.
The daily report will be mailed to the PC owner on his/her
email.
 The timing of the email and the email address can be changed
later in the settings
10

 PC Monitoring:
 User can use this setting to keep track of the screen status.
 The keylogger along with capturing keystrokes will take screenshots
of the screen at regular intervals so that the owner can also see what
was the status of the screen at any particular point of time.
 The interval of the screen shots can be changed in the settings
 This feature can also be turned off.
11

 Maintaining the log files:


 The keylogger will maintain the files containing the keystrokes for a
maximum of 7 days.
 The program will than automatically delete the past files.
 This setting can also be changed later.
12 Feasibility Study

Our project is made considering 4 feasible studies wchich are as


fallows:
 Economical Feasibility
 Technical Feasibility
 Operational Feasibility
 Legal Feasibility
13 Economic Feasibility
 The software can easily run on windows 7 and above.
 We have used Tk GUI library, so it does not cost much.
14 Technical Feasibility
 The required software is regular PC and the code is written in
Python language.
 It can run on any PC so high technical specifications are not
required
15 Operational Feasibility
 The device can track the activities of the users who have access to
the system.
 And can set accordingly if any suspicious or unauthorized is found
16 Legal Feasibility
 Our project will not contravene any law as the program will be
installed by the Device owner with his/her consent and will not
interfere with privacy of anyone else.
17
Preventions

 There several ways to prevent keyloggers:


 Anti-virus/spyware & Firewalls
 Automatic Form Fillers
 On screen Keyboard
18 Conclusion
 As there always two sides of coin just like this keylogger has good
as well as bad reputation.
 In the world of hacking it is use to hack someones personal details.
While on the other hand it is used in a company to monitor any
suspecious activity that may cause serious liabilityto the company’s
benefit.
 But we must aware what is installed on the computer. Use when
surfing the internet. Keep your computer’s security software
updated.
Flow chart
19
COMPOSITION

BACKEND FRONTEND

Tkinter
LANGUAGES

FEATURES

SQL PYTHON
DAILY REPORT
SENT TO ADMIN
PRACTICAL USES BY E-MAIL

SECURITY AND
MONITORING

You might also like