Professional Documents
Culture Documents
Keylogger
Keylogger
Keylogger
DOMAIN:CYBERSECURITY
PRESENTED BY
AARAV JHA-1GA19CS001
AJAY SINGH-1GA19CS005
ANAGHA M-1GA19CS014
DHRUTHI S-1GA19CS046
2 OVERVIEW
This system is actually going to be designed in way that it monitors and keep a tab on the “keystroke’ made on a
users keyboard .
And it can be used in both good and bad way , as it compromise with the sensitive data like bank details ,
password, etc.
The utilization of keylogger is being utilized for distinguishing and logging what intruders are doing when
performing advances. Accumulating keystrokes is a significant advance towards getting programmers and
obtain information about the advances.
The keylogger can record all exercises identified with the accentuation on the console keys or action on the
working framework. String coordinating is a strategy for coordinating characters from the info procedure like a
console, and this coordinating procedure is finished by confirming each approaching character. The utilization
of string-coordinating calculations on keylogger applications used to screen client action makes it increasingly
agreeable and quicker
3 PROBLEM STATEMENT
In institutes or companies the students and the employees don't use the resources efficiently
instead waste their time and resources.
4 SOLUTION
The solution to the above existing problem is that we can build keyloggers. The proposed
model provides the solution that reduces the difficulties while installing the keylogger in the
target system.
Proposed software is efficient enough to get installed in targeted system by itself when the
user for example clicks the malicious link sent to him through mail or any social media and
finally captures all the keystrokes of the user while he is logged into the system, saves the
logs in a folder or sends the log directly to the mail address of the third party.
5 END USER