Keylogger

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 6

KEYLOGGING

DOMAIN:CYBERSECURITY
PRESENTED BY
AARAV JHA-1GA19CS001
AJAY SINGH-1GA19CS005
ANAGHA M-1GA19CS014

DHRUTHI S-1GA19CS046
2 OVERVIEW

This system is actually going to be designed in way that it monitors and keep a tab on the “keystroke’ made on a
users keyboard .
And it can be used in both good and bad way , as it compromise with the sensitive data like bank details ,
password, etc.
The utilization of keylogger is being utilized for distinguishing and logging what intruders are doing when
performing advances. Accumulating keystrokes is a significant advance towards getting programmers and
obtain information about the advances.
The keylogger can record all exercises identified with the accentuation on the console keys or action on the
working framework. String coordinating is a strategy for coordinating characters from the info procedure like a
console, and this coordinating procedure is finished by confirming each approaching character. The utilization
of string-coordinating calculations on keylogger applications used to screen client action makes it increasingly
agreeable and quicker
3 PROBLEM STATEMENT

In institutes or companies the students and the employees don't use the resources efficiently
instead waste their time and resources.
4 SOLUTION

The solution to the above existing problem is that we can build keyloggers. The proposed
model provides the solution that reduces the difficulties while installing the keylogger in the
target system.
Proposed software is efficient enough to get installed in targeted system by itself when the
user for example clicks the malicious link sent to him through mail or any social media and
finally captures all the keystrokes of the user while he is logged into the system, saves the
logs in a folder or sends the log directly to the mail address of the third party.
5 END USER

• employers to observe employees' computer activities


• parents to supervise their children's internet usage
• device owners to track possible unauthorized activity on their devices
• law enforcement agencies to analyze incidents involving computer use:
• IT Troubleshooting : to collect details on user problems and resolve accurately
• Computer product development : to gather user feedback and improve products
• Business server monitoring : to watch for unauthorized user activity on web server
6 CONCLUSION

• A keylogger is a type of surveillance software that has capability to record every


keystroke.
• A keylogger recorder can record instant messages, email and any information we type
through our keyboard
• The log file created by the keylogger can be sent to a specific receiver.

You might also like