Keylogger is a software that records each and every keystroke the victim enter, including mouse clicks. In our day, it’s very hard to trust human, they lied, joke, play and most of the time try to get only their own profit, but humans trust machine (Software) because they created them and made some rules for machines that machine cannot break because they are under human control by programing and algorithm. Cyber security is the police of the internet and keylogger is one of his weapon. Keylogger can be used to spy the victim and most of the time it gives as output the most accurate report possible that even human cannot product. It’s more trustful than human and reduce corruption too. It can be represented as a camera that record everything inside a shop.
This project is based on the implementation of a keylogger software who can help a specific user to track keystroke on a computer system in term of cyber security. A software that will be able to save whatever happens in the computer and send data to a specific email or server (Mostly on an online drive). It takes a few minutes to install it in the victim’s system as software, from that time the attacker will get every single activity from the victim’s computer. Everything that happen in the victim computer (Keystroke) is saved. The activity can be saved in the victim’s system or it can be send to the attacker email or can be uploaded to a chosen server.
In this project, as it is for non-malicious purpose the data will be keep in the victim computer so then he will be able to find them and check the keystroke typed on his own system.
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Create a software key logger
1. Creating a software keylogger for cyber
security
Giral Faurel ONDZONGO
2019003027.giral@ug.shada.ac.in
Department of Computer Science and Engineering , School of Engineering and Technology , Sharda
University, Greater Noida , India
Abstract:
Keylogger is a software that records each and every keystroke the victim enter, including mouse
clicks. In our day, it’s very hard to trust human, they lied, joke, play and most of the time try to
get only their own profit, but humans trust machine (Software) because they created them and
made some rules for machines that machine cannot break because they are under human control
by programing and algorithm. Cyber security is the police of the internet and keylogger is one of
his weapon. Keylogger can be used to spy the victim and most of the time it gives as output the
most accurate report possible that even human cannot product. It’s more trustful than human and
reduce corruption too. It can be represented as a camera that record everything inside a shop.
This project is based on the implementation of a keylogger software who can help a specific user
to track keystroke on a computer system in term of cyber security. A software that will be able to
save whatever happens in the computer and send data to a specific email or server (Mostly on an
online drive). It takes a few minutes to install it in the victim’s system as software, from that time
the attacker will get every single activity from the victim’s computer. Everything that happen in
the victim computer (Keystroke) is saved. The activity can be saved in the victim’s system or it
can be send to the attacker email or can be uploaded to a chosen server.
In this project, as it is for non-malicious purpose the data will be keep in the victim computer so
then he will be able to find them and check the keystroke typed on his own system.
Introduction:
In Computer science, is very important. As said Martina Navratilova “Security used to be an
inconvenience sometimes, but now it’s a necessity all the time. “It’s the computer police. Cyber
security is the fact of defending computers, servers, mobile devices, electronic systems, networks,
and data from malicious attacks. It's also called by information technology security or electronic
information security. The term depends of the concept, from business to mobile computing, and
can be divided into a few common categories.
Network security, is a set of technologies that protects the usability and
integrity of a company's infrastructure by preventing the entry or proliferation
within a network of a wide variety of potential threats.
Application security, keep software and devices free of threats. A
compromised application could provide access to the data its designed to
protect. Successful security begins in the design stage, well before a program
or device is deployed (Our main topic).
Information security. protects the privacy of data
2. Fig 2: Cybersecurity
Ethical hacking is a subset of cybersecurity, it involves an authorized attempt to gain unauthorized
access to a computer system, application, or data. It helps to find security vulnerabilities which
can then be resolved before attackers has the chance to use them. These are 3 main type of
hackers:
White Hat Hackers: Here, the hacker looks for bugs and ethically report it
to the organization. He is authorized to test and search for bugs in a website
or network then report them to the company. White hat hackers generally get
all the needed information to test for, from the organization itself. They use
their skills to test it before the program goes live or attacked by malicious
hackers like black hat hackers.
Black Hat Hackers: Here, the organization doesn’t allow the user to test it.
They illegally enter inside the company and steal data from the admin panel
or manipulate the data. They are selfish and use data for personal financial
gain. They can cause major damage to the company by modifying some data
which lead to the loss of the company. IT IS ILEGAL
Grey Hat Hackers: They sometimes access to the data and violates the law.
But doesn’t have the same goal as Black hat hackers. The main difference is
that they exploit vulnerability publicly whereas white hat hackers do it
privately for the company.
Fig 3: Ethical hacking
They are a lot of way to hack a system or a user, it can be a white hack, a black hack or a Grey
hack. One of the famous attack is the keylogger attack, what actually is our topic.
3. Keylogging programs or keyloggers, are a type of malware or software that track user input from
the keyboard in an attempt to save data or stock information. They gather complete information
about what the victim is doing. They are like surveillance camera that record everything for
security. With the evolution computer science, employers have access to the necessary tools to
keep a close eye on individual productivity and activity. Also known as a keystroke logging or
keystroke logger, this type of employee monitoring software keeps a by-the-moment record of
each key an employee presses on their keyboard.
As a software, it’s difficult for employees to detect but there is also physical keystroke loggers.
Fig 4: Common keylogging threats
Key word: Creating a software keylogger for cyber security
1.1 Research contribution
Giral Faurel ONDZONGO conceived of the presented idea, developed the theory and
performed the computations. He verified the analytical methods. The super visor Prashant
Upadhyay encouraged Giral Faurel ONDZONGO to investigate the code and the algorithm and
supervised the findings of this work.
1.2 Organization of the paper
In the first place of this paper we see the introduction of a keylogger software, definition, origins
and working of keylogger, some important information about cyber security and ethical hacking
are mentioned too like different type of hackers and hacking attacks.
Next will come literature survey combine to related wok where we going to see some work that is
a little bit similar to our work; then will come the methodology used on our work and algorithm
used to perform it.
Last art will be the output and conclusion of the paper.
4. 1. Literature review:
NO
Paper name and
author
Keylogger Detection
Technique
Results
1 Mohamad Yusof Darus
Enhancement Keylogger
Application for Parental
Control and
Monitor Children's
Activities
This paper describe the impact of
keylogger in parental control
As result, all keystrokes are sent to
the parent and it can detect
inappropriate words typed in almost
all
browsers
2 Chairul Imam Muhammad
Furqon Siregar
UTILIZATION OF KEY
LOGGER IN SECURITY
ASPECT BASED ON
SPYWARE FOR
MONITORING LAPTOP
USING REFOG KEY
This paper describe the Working
of keylogger without the victim
notify that the software is
running as it has been legibly
installed
As result all keystroke are saved in
a specific folder
3 Permata Ayu Widyasari
Ethical Dilemma Decision
Making Based on
Personality:
The Case of Installation of
a Keylogger System
This paper describe how ethical
keylogger can be and if it should
be installed
As result, keylogger is very useful
for spying and recording works but
the best case will be to hire peoples
with good ethical
4 Dr. C. Umarani Rajrishi
Keyloggers: A Malicious
Attack Sengupta
This is a survey of keylogger
malicious attack
This survey article endeavors to an
understanding on the
ongoing progressions on the
endeavors to alleviate the
dangers of keylogging assaults.
5 Manan Kalpesh Shah
, Devashree Kataria
, S. Bharath Raj
, Priya G Real Time
Working of Keylogger
Malware
Analysis
This paper describe the working
of a keystroke logger
As result, keylogger is easy to
understand as it as the simple task
of recording and it’s illegal to use it
without the victim authorization
2. Proposal method
As a software, having some knowledge about software development and python is very required
for understand this work to be done.
The code will be written only on python, the goal here will be to create a python file, convert it
into an application. The keystroke has to be send to a specific email as file and contain all the
data specified in the code (Keystroke, screenshot, audio sound).
5. Fig 6 : Keylogger process
The exact string matching algorithm is used to match keyboard input variables with input received from
the keyboard, the word will be identified as a word entered by the user.
a. Algorithm
1. Beginning
2. Installing spyder and check compatibility with Python 3
3. Import libraries
4. CREATING FILES AND APPENDING TO FILES
5. LOGGING KEYS
6. Add EMAIL functions
7. Get COMPUTER INFORMATION
8. CLIPBOARD incorporation
9. SCREENSHOT, keystroke, audio
10. BUILD THE TIMER
11. ENCRYPTION OF FILES
12. Convert the python code into exe application
13. Add the software as exclusion on the antivirus
14. End
7. Installing spyder : Spyder will help us to implement python as a compiler
Libraries: In computer science, a library is a collection of non-volatile resources used by
computer programs, often for software development.
CREATING FILES AND APPENDING TO FILES: For multiple parts of the
keylogger, we will be appending data to files. Before we append data to files, we must
first create variables with the proper extensions.
LOGGING KEYS: To log keys using python, we will be using the pynput module.
EMAIL: To add an email functionality, we will be using the email module.
COMPUTER INFORMATION: To gather computer information, we will use socket
CLIPBOARD: To get the clipboard information, we will be using the win32clipboard
module, which is a submodule of pywin32
MICROPHONE: To record with microphone, we will be using the sounddevice module
and writing to a .wav file using the scipy.io.wavefile module.
SCREENSHOT: To take a screenshot, we will use the ImageGrab from the Pillow
Module.
BUILD THE TIMER: To build a timer which goes through a certain number of
iterations before the keylogger ends, we will be using the timer function.
ENCRYPTION OF FILES: To encrypt files, we will use the cryptography.fernet
module.
3. Result and analysis
The output of the work will be in form of file sent to a specific mail choose by the developer
since the code.
Keystroke logger take all record from the computer, not only stroke, it takes screenshot and
audio information as mentioned above in the paper. It still remains invisible in the eye of the
user but data are stocked and sent. the sending mail is also sectioned from the code as long as the
receiving mail.
8. Conclusion
Keystroke logging attacks bypass all other controls. They are easy to implement and manage,
providing attackers with useful account, identity, and intellectual property information. On the
other hand, they are useful investigative tools. Controlling keylogging technology within your
organization is no different than managing other threats and tools, requiring common sense and
a layered defense. The key is to be aware they exist, understand how they’re used, and
implement ways to detect them, with keylogger detection and containment part of your incident
response plan.
4. Bibliography/References
1. Darus, Mohamad Yusof, and Muhammad Azizi Mohd Ariffin.
"Enhancement Keylogger Application for Parental Control and Monitor
Children's Activities." Journal of Positive School Psychology 6.3 (2022):
8482-8492.
2. Imam, Chairul, and Muhammad Furqon Siregar. "Utilization Of Key Logger
In Security Aspect Based On Spyware For Monitoring Laptop Using Refog
Key Logger." INFOKUM 10.1 (2021): 105-111.
3. Widyasari, Permata Ayu. "Ethical dilemma decision making based on
personality: the case of installation of a keylogger system." (2021): 252-258.
4. Umarani, C., and Rajrishi Sengupta. "Keyloggers: A Malicious Attack."
(2020).
5. Srivastava, Mayank, et al. "Analysis and Implementation of Novel
Keylogger Technique." 2021 5th International Conference on Information
Systems and Computer Networks (ISCON). IEEE, 2021.