SlideShare a Scribd company logo
1 of 9
Creating a software keylogger for cyber
security
Giral Faurel ONDZONGO
2019003027.giral@ug.shada.ac.in
Department of Computer Science and Engineering , School of Engineering and Technology , Sharda
University, Greater Noida , India
Abstract:
Keylogger is a software that records each and every keystroke the victim enter, including mouse
clicks. In our day, it’s very hard to trust human, they lied, joke, play and most of the time try to
get only their own profit, but humans trust machine (Software) because they created them and
made some rules for machines that machine cannot break because they are under human control
by programing and algorithm. Cyber security is the police of the internet and keylogger is one of
his weapon. Keylogger can be used to spy the victim and most of the time it gives as output the
most accurate report possible that even human cannot product. It’s more trustful than human and
reduce corruption too. It can be represented as a camera that record everything inside a shop.
This project is based on the implementation of a keylogger software who can help a specific user
to track keystroke on a computer system in term of cyber security. A software that will be able to
save whatever happens in the computer and send data to a specific email or server (Mostly on an
online drive). It takes a few minutes to install it in the victim’s system as software, from that time
the attacker will get every single activity from the victim’s computer. Everything that happen in
the victim computer (Keystroke) is saved. The activity can be saved in the victim’s system or it
can be send to the attacker email or can be uploaded to a chosen server.
In this project, as it is for non-malicious purpose the data will be keep in the victim computer so
then he will be able to find them and check the keystroke typed on his own system.
Introduction:
In Computer science, is very important. As said Martina Navratilova “Security used to be an
inconvenience sometimes, but now it’s a necessity all the time. “It’s the computer police. Cyber
security is the fact of defending computers, servers, mobile devices, electronic systems, networks,
and data from malicious attacks. It's also called by information technology security or electronic
information security. The term depends of the concept, from business to mobile computing, and
can be divided into a few common categories.
 Network security, is a set of technologies that protects the usability and
integrity of a company's infrastructure by preventing the entry or proliferation
within a network of a wide variety of potential threats.
 Application security, keep software and devices free of threats. A
compromised application could provide access to the data its designed to
protect. Successful security begins in the design stage, well before a program
or device is deployed (Our main topic).
 Information security. protects the privacy of data
Fig 2: Cybersecurity
Ethical hacking is a subset of cybersecurity, it involves an authorized attempt to gain unauthorized
access to a computer system, application, or data. It helps to find security vulnerabilities which
can then be resolved before attackers has the chance to use them. These are 3 main type of
hackers:
 White Hat Hackers: Here, the hacker looks for bugs and ethically report it
to the organization. He is authorized to test and search for bugs in a website
or network then report them to the company. White hat hackers generally get
all the needed information to test for, from the organization itself. They use
their skills to test it before the program goes live or attacked by malicious
hackers like black hat hackers.
 Black Hat Hackers: Here, the organization doesn’t allow the user to test it.
They illegally enter inside the company and steal data from the admin panel
or manipulate the data. They are selfish and use data for personal financial
gain. They can cause major damage to the company by modifying some data
which lead to the loss of the company. IT IS ILEGAL
 Grey Hat Hackers: They sometimes access to the data and violates the law.
But doesn’t have the same goal as Black hat hackers. The main difference is
that they exploit vulnerability publicly whereas white hat hackers do it
privately for the company.
Fig 3: Ethical hacking
They are a lot of way to hack a system or a user, it can be a white hack, a black hack or a Grey
hack. One of the famous attack is the keylogger attack, what actually is our topic.
Keylogging programs or keyloggers, are a type of malware or software that track user input from
the keyboard in an attempt to save data or stock information. They gather complete information
about what the victim is doing. They are like surveillance camera that record everything for
security. With the evolution computer science, employers have access to the necessary tools to
keep a close eye on individual productivity and activity. Also known as a keystroke logging or
keystroke logger, this type of employee monitoring software keeps a by-the-moment record of
each key an employee presses on their keyboard.
As a software, it’s difficult for employees to detect but there is also physical keystroke loggers.
Fig 4: Common keylogging threats
Key word: Creating a software keylogger for cyber security
1.1 Research contribution
Giral Faurel ONDZONGO conceived of the presented idea, developed the theory and
performed the computations. He verified the analytical methods. The super visor Prashant
Upadhyay encouraged Giral Faurel ONDZONGO to investigate the code and the algorithm and
supervised the findings of this work.
1.2 Organization of the paper
In the first place of this paper we see the introduction of a keylogger software, definition, origins
and working of keylogger, some important information about cyber security and ethical hacking
are mentioned too like different type of hackers and hacking attacks.
Next will come literature survey combine to related wok where we going to see some work that is
a little bit similar to our work; then will come the methodology used on our work and algorithm
used to perform it.
Last art will be the output and conclusion of the paper.
1. Literature review:
NO
Paper name and
author
Keylogger Detection
Technique
Results
1 Mohamad Yusof Darus
Enhancement Keylogger
Application for Parental
Control and
Monitor Children's
Activities
This paper describe the impact of
keylogger in parental control
As result, all keystrokes are sent to
the parent and it can detect
inappropriate words typed in almost
all
browsers
2 Chairul Imam Muhammad
Furqon Siregar
UTILIZATION OF KEY
LOGGER IN SECURITY
ASPECT BASED ON
SPYWARE FOR
MONITORING LAPTOP
USING REFOG KEY
This paper describe the Working
of keylogger without the victim
notify that the software is
running as it has been legibly
installed
As result all keystroke are saved in
a specific folder
3 Permata Ayu Widyasari
Ethical Dilemma Decision
Making Based on
Personality:
The Case of Installation of
a Keylogger System
This paper describe how ethical
keylogger can be and if it should
be installed
As result, keylogger is very useful
for spying and recording works but
the best case will be to hire peoples
with good ethical
4 Dr. C. Umarani Rajrishi
Keyloggers: A Malicious
Attack Sengupta
This is a survey of keylogger
malicious attack
This survey article endeavors to an
understanding on the
ongoing progressions on the
endeavors to alleviate the
dangers of keylogging assaults.
5 Manan Kalpesh Shah
, Devashree Kataria
, S. Bharath Raj
, Priya G Real Time
Working of Keylogger
Malware
Analysis
This paper describe the working
of a keystroke logger
As result, keylogger is easy to
understand as it as the simple task
of recording and it’s illegal to use it
without the victim authorization
2. Proposal method
As a software, having some knowledge about software development and python is very required
for understand this work to be done.
The code will be written only on python, the goal here will be to create a python file, convert it
into an application. The keystroke has to be send to a specific email as file and contain all the
data specified in the code (Keystroke, screenshot, audio sound).
Fig 6 : Keylogger process
The exact string matching algorithm is used to match keyboard input variables with input received from
the keyboard, the word will be identified as a word entered by the user.
a. Algorithm
1. Beginning
2. Installing spyder and check compatibility with Python 3
3. Import libraries
4. CREATING FILES AND APPENDING TO FILES
5. LOGGING KEYS
6. Add EMAIL functions
7. Get COMPUTER INFORMATION
8. CLIPBOARD incorporation
9. SCREENSHOT, keystroke, audio
10. BUILD THE TIMER
11. ENCRYPTION OF FILES
12. Convert the python code into exe application
13. Add the software as exclusion on the antivirus
14. End
END
Fig 7 : Algorithm
Libraries
 Installing spyder : Spyder will help us to implement python as a compiler
 Libraries: In computer science, a library is a collection of non-volatile resources used by
computer programs, often for software development.
 CREATING FILES AND APPENDING TO FILES: For multiple parts of the
keylogger, we will be appending data to files. Before we append data to files, we must
first create variables with the proper extensions.
 LOGGING KEYS: To log keys using python, we will be using the pynput module.
 EMAIL: To add an email functionality, we will be using the email module.
 COMPUTER INFORMATION: To gather computer information, we will use socket
 CLIPBOARD: To get the clipboard information, we will be using the win32clipboard
module, which is a submodule of pywin32
 MICROPHONE: To record with microphone, we will be using the sounddevice module
and writing to a .wav file using the scipy.io.wavefile module.
 SCREENSHOT: To take a screenshot, we will use the ImageGrab from the Pillow
Module.
 BUILD THE TIMER: To build a timer which goes through a certain number of
iterations before the keylogger ends, we will be using the timer function.
 ENCRYPTION OF FILES: To encrypt files, we will use the cryptography.fernet
module.
3. Result and analysis
The output of the work will be in form of file sent to a specific mail choose by the developer
since the code.
Keystroke logger take all record from the computer, not only stroke, it takes screenshot and
audio information as mentioned above in the paper. It still remains invisible in the eye of the
user but data are stocked and sent. the sending mail is also sectioned from the code as long as the
receiving mail.
Conclusion
Keystroke logging attacks bypass all other controls. They are easy to implement and manage,
providing attackers with useful account, identity, and intellectual property information. On the
other hand, they are useful investigative tools. Controlling keylogging technology within your
organization is no different than managing other threats and tools, requiring common sense and
a layered defense. The key is to be aware they exist, understand how they’re used, and
implement ways to detect them, with keylogger detection and containment part of your incident
response plan.
4. Bibliography/References
1. Darus, Mohamad Yusof, and Muhammad Azizi Mohd Ariffin.
"Enhancement Keylogger Application for Parental Control and Monitor
Children's Activities." Journal of Positive School Psychology 6.3 (2022):
8482-8492.
2. Imam, Chairul, and Muhammad Furqon Siregar. "Utilization Of Key Logger
In Security Aspect Based On Spyware For Monitoring Laptop Using Refog
Key Logger." INFOKUM 10.1 (2021): 105-111.
3. Widyasari, Permata Ayu. "Ethical dilemma decision making based on
personality: the case of installation of a keylogger system." (2021): 252-258.
4. Umarani, C., and Rajrishi Sengupta. "Keyloggers: A Malicious Attack."
(2020).
5. Srivastava, Mayank, et al. "Analysis and Implementation of Novel
Keylogger Technique." 2021 5th International Conference on Information
Systems and Computer Networks (ISCON). IEEE, 2021.
Create a software key logger

More Related Content

What's hot

Hacking the future with USB HID
Hacking the future with USB HIDHacking the future with USB HID
Hacking the future with USB HIDNikhil Mittal
 
Man in The Middle Attack
Man in The Middle AttackMan in The Middle Attack
Man in The Middle AttackDeepak Upadhyay
 
Network Security
Network SecurityNetwork Security
Network Securityforpalmigho
 
Security and Integrity of Data
Security and Integrity of DataSecurity and Integrity of Data
Security and Integrity of DataAdeel Riaz
 
Bug Bounty - Hackers Job
Bug Bounty - Hackers JobBug Bounty - Hackers Job
Bug Bounty - Hackers JobArbin Godar
 
certified-ethical-hacker-cehv12_course_content.pdf
certified-ethical-hacker-cehv12_course_content.pdfcertified-ethical-hacker-cehv12_course_content.pdf
certified-ethical-hacker-cehv12_course_content.pdfinfosec train
 
Information security
Information securityInformation security
Information securitylinalona515
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityjayashri kolekar
 
Metasploit seminar
Metasploit seminarMetasploit seminar
Metasploit seminarhenelpj
 
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information SecurityDr Naim R Kidwai
 
KeyLoggers - beating the shit out of keyboard since quite a long time
KeyLoggers - beating the shit out of keyboard since quite a long timeKeyLoggers - beating the shit out of keyboard since quite a long time
KeyLoggers - beating the shit out of keyboard since quite a long timen|u - The Open Security Community
 
Webinar: Kesadaran Keamanan Informasi (3 Desember 2021)
Webinar: Kesadaran Keamanan Informasi (3 Desember 2021)Webinar: Kesadaran Keamanan Informasi (3 Desember 2021)
Webinar: Kesadaran Keamanan Informasi (3 Desember 2021)Achmad Solichin
 
Hacking with Reverse Engineering and Defense against it
Hacking with Reverse Engineering and Defense against it Hacking with Reverse Engineering and Defense against it
Hacking with Reverse Engineering and Defense against it Prakashchand Suthar
 
Network Attacks and Countermeasures
Network Attacks and CountermeasuresNetwork Attacks and Countermeasures
Network Attacks and Countermeasureskaranwayne
 
SQL INJECTION
SQL INJECTIONSQL INJECTION
SQL INJECTIONAnoop T
 

What's hot (20)

IPSec and VPN
IPSec and VPNIPSec and VPN
IPSec and VPN
 
Hacking the future with USB HID
Hacking the future with USB HIDHacking the future with USB HID
Hacking the future with USB HID
 
Man in The Middle Attack
Man in The Middle AttackMan in The Middle Attack
Man in The Middle Attack
 
Network Security
Network SecurityNetwork Security
Network Security
 
Security and Integrity of Data
Security and Integrity of DataSecurity and Integrity of Data
Security and Integrity of Data
 
Bug Bounty - Hackers Job
Bug Bounty - Hackers JobBug Bounty - Hackers Job
Bug Bounty - Hackers Job
 
certified-ethical-hacker-cehv12_course_content.pdf
certified-ethical-hacker-cehv12_course_content.pdfcertified-ethical-hacker-cehv12_course_content.pdf
certified-ethical-hacker-cehv12_course_content.pdf
 
Information security
Information securityInformation security
Information security
 
VPN Virtual Private Network
VPN Virtual Private NetworkVPN Virtual Private Network
VPN Virtual Private Network
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Encryption ppt
Encryption pptEncryption ppt
Encryption ppt
 
Network security
Network securityNetwork security
Network security
 
Metasploit seminar
Metasploit seminarMetasploit seminar
Metasploit seminar
 
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information Security
 
Password management
Password managementPassword management
Password management
 
KeyLoggers - beating the shit out of keyboard since quite a long time
KeyLoggers - beating the shit out of keyboard since quite a long timeKeyLoggers - beating the shit out of keyboard since quite a long time
KeyLoggers - beating the shit out of keyboard since quite a long time
 
Webinar: Kesadaran Keamanan Informasi (3 Desember 2021)
Webinar: Kesadaran Keamanan Informasi (3 Desember 2021)Webinar: Kesadaran Keamanan Informasi (3 Desember 2021)
Webinar: Kesadaran Keamanan Informasi (3 Desember 2021)
 
Hacking with Reverse Engineering and Defense against it
Hacking with Reverse Engineering and Defense against it Hacking with Reverse Engineering and Defense against it
Hacking with Reverse Engineering and Defense against it
 
Network Attacks and Countermeasures
Network Attacks and CountermeasuresNetwork Attacks and Countermeasures
Network Attacks and Countermeasures
 
SQL INJECTION
SQL INJECTIONSQL INJECTION
SQL INJECTION
 

Similar to Create a software key logger

Detection and prevention of keylogger spyware attacks
Detection and prevention of keylogger spyware attacksDetection and prevention of keylogger spyware attacks
Detection and prevention of keylogger spyware attacksIAEME Publication
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingAnumadil1
 
Selected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingSelected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingCSITiaesprime
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxMaheshDhope1
 
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxBishalRay8
 
IRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical HackingIRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical HackingIRJET Journal
 
Summer training in jaipur
Summer training in jaipurSummer training in jaipur
Summer training in jaipurcyber cure
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxVishnuVarma47
 
Ways You Can Use Python For Cybersecurity - AppsDevPro
Ways You Can Use Python For Cybersecurity - AppsDevPro Ways You Can Use Python For Cybersecurity - AppsDevPro
Ways You Can Use Python For Cybersecurity - AppsDevPro SofiaCarter4
 
BASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKINGBASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKINGDrm Kapoor
 
Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraVaishnaviKhandelwal6
 
Ethical hacking BY Thariq ibnu Ubaidhullah
Ethical hacking BY Thariq ibnu UbaidhullahEthical hacking BY Thariq ibnu Ubaidhullah
Ethical hacking BY Thariq ibnu Ubaidhullahpongada123
 
Ethical Hacking .pptx
Ethical Hacking .pptxEthical Hacking .pptx
Ethical Hacking .pptxjohnnymaaza
 
Final project.ppt
Final project.pptFinal project.ppt
Final project.pptshreyng
 

Similar to Create a software key logger (20)

Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Detection and prevention of keylogger spyware attacks
Detection and prevention of keylogger spyware attacksDetection and prevention of keylogger spyware attacks
Detection and prevention of keylogger spyware attacks
 
43 automatic
43 automatic43 automatic
43 automatic
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Selected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingSelected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testing
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
Ethical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptxEthical-Hacking-ppt.pptx
Ethical-Hacking-ppt.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptx
 
IRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical HackingIRJET- Study of Hacking and Ethical Hacking
IRJET- Study of Hacking and Ethical Hacking
 
Summer training in jaipur
Summer training in jaipurSummer training in jaipur
Summer training in jaipur
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
Ways You Can Use Python For Cybersecurity - AppsDevPro
Ways You Can Use Python For Cybersecurity - AppsDevPro Ways You Can Use Python For Cybersecurity - AppsDevPro
Ways You Can Use Python For Cybersecurity - AppsDevPro
 
Integrated honeypot
Integrated honeypotIntegrated honeypot
Integrated honeypot
 
BASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKINGBASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKING
 
Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu arora
 
Ethical hacking BY Thariq ibnu Ubaidhullah
Ethical hacking BY Thariq ibnu UbaidhullahEthical hacking BY Thariq ibnu Ubaidhullah
Ethical hacking BY Thariq ibnu Ubaidhullah
 
Ethical Hacking .pptx
Ethical Hacking .pptxEthical Hacking .pptx
Ethical Hacking .pptx
 
Final project.ppt
Final project.pptFinal project.ppt
Final project.ppt
 

Recently uploaded

EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 

Recently uploaded (20)

EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 

Create a software key logger

  • 1. Creating a software keylogger for cyber security Giral Faurel ONDZONGO 2019003027.giral@ug.shada.ac.in Department of Computer Science and Engineering , School of Engineering and Technology , Sharda University, Greater Noida , India Abstract: Keylogger is a software that records each and every keystroke the victim enter, including mouse clicks. In our day, it’s very hard to trust human, they lied, joke, play and most of the time try to get only their own profit, but humans trust machine (Software) because they created them and made some rules for machines that machine cannot break because they are under human control by programing and algorithm. Cyber security is the police of the internet and keylogger is one of his weapon. Keylogger can be used to spy the victim and most of the time it gives as output the most accurate report possible that even human cannot product. It’s more trustful than human and reduce corruption too. It can be represented as a camera that record everything inside a shop. This project is based on the implementation of a keylogger software who can help a specific user to track keystroke on a computer system in term of cyber security. A software that will be able to save whatever happens in the computer and send data to a specific email or server (Mostly on an online drive). It takes a few minutes to install it in the victim’s system as software, from that time the attacker will get every single activity from the victim’s computer. Everything that happen in the victim computer (Keystroke) is saved. The activity can be saved in the victim’s system or it can be send to the attacker email or can be uploaded to a chosen server. In this project, as it is for non-malicious purpose the data will be keep in the victim computer so then he will be able to find them and check the keystroke typed on his own system. Introduction: In Computer science, is very important. As said Martina Navratilova “Security used to be an inconvenience sometimes, but now it’s a necessity all the time. “It’s the computer police. Cyber security is the fact of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also called by information technology security or electronic information security. The term depends of the concept, from business to mobile computing, and can be divided into a few common categories.  Network security, is a set of technologies that protects the usability and integrity of a company's infrastructure by preventing the entry or proliferation within a network of a wide variety of potential threats.  Application security, keep software and devices free of threats. A compromised application could provide access to the data its designed to protect. Successful security begins in the design stage, well before a program or device is deployed (Our main topic).  Information security. protects the privacy of data
  • 2. Fig 2: Cybersecurity Ethical hacking is a subset of cybersecurity, it involves an authorized attempt to gain unauthorized access to a computer system, application, or data. It helps to find security vulnerabilities which can then be resolved before attackers has the chance to use them. These are 3 main type of hackers:  White Hat Hackers: Here, the hacker looks for bugs and ethically report it to the organization. He is authorized to test and search for bugs in a website or network then report them to the company. White hat hackers generally get all the needed information to test for, from the organization itself. They use their skills to test it before the program goes live or attacked by malicious hackers like black hat hackers.  Black Hat Hackers: Here, the organization doesn’t allow the user to test it. They illegally enter inside the company and steal data from the admin panel or manipulate the data. They are selfish and use data for personal financial gain. They can cause major damage to the company by modifying some data which lead to the loss of the company. IT IS ILEGAL  Grey Hat Hackers: They sometimes access to the data and violates the law. But doesn’t have the same goal as Black hat hackers. The main difference is that they exploit vulnerability publicly whereas white hat hackers do it privately for the company. Fig 3: Ethical hacking They are a lot of way to hack a system or a user, it can be a white hack, a black hack or a Grey hack. One of the famous attack is the keylogger attack, what actually is our topic.
  • 3. Keylogging programs or keyloggers, are a type of malware or software that track user input from the keyboard in an attempt to save data or stock information. They gather complete information about what the victim is doing. They are like surveillance camera that record everything for security. With the evolution computer science, employers have access to the necessary tools to keep a close eye on individual productivity and activity. Also known as a keystroke logging or keystroke logger, this type of employee monitoring software keeps a by-the-moment record of each key an employee presses on their keyboard. As a software, it’s difficult for employees to detect but there is also physical keystroke loggers. Fig 4: Common keylogging threats Key word: Creating a software keylogger for cyber security 1.1 Research contribution Giral Faurel ONDZONGO conceived of the presented idea, developed the theory and performed the computations. He verified the analytical methods. The super visor Prashant Upadhyay encouraged Giral Faurel ONDZONGO to investigate the code and the algorithm and supervised the findings of this work. 1.2 Organization of the paper In the first place of this paper we see the introduction of a keylogger software, definition, origins and working of keylogger, some important information about cyber security and ethical hacking are mentioned too like different type of hackers and hacking attacks. Next will come literature survey combine to related wok where we going to see some work that is a little bit similar to our work; then will come the methodology used on our work and algorithm used to perform it. Last art will be the output and conclusion of the paper.
  • 4. 1. Literature review: NO Paper name and author Keylogger Detection Technique Results 1 Mohamad Yusof Darus Enhancement Keylogger Application for Parental Control and Monitor Children's Activities This paper describe the impact of keylogger in parental control As result, all keystrokes are sent to the parent and it can detect inappropriate words typed in almost all browsers 2 Chairul Imam Muhammad Furqon Siregar UTILIZATION OF KEY LOGGER IN SECURITY ASPECT BASED ON SPYWARE FOR MONITORING LAPTOP USING REFOG KEY This paper describe the Working of keylogger without the victim notify that the software is running as it has been legibly installed As result all keystroke are saved in a specific folder 3 Permata Ayu Widyasari Ethical Dilemma Decision Making Based on Personality: The Case of Installation of a Keylogger System This paper describe how ethical keylogger can be and if it should be installed As result, keylogger is very useful for spying and recording works but the best case will be to hire peoples with good ethical 4 Dr. C. Umarani Rajrishi Keyloggers: A Malicious Attack Sengupta This is a survey of keylogger malicious attack This survey article endeavors to an understanding on the ongoing progressions on the endeavors to alleviate the dangers of keylogging assaults. 5 Manan Kalpesh Shah , Devashree Kataria , S. Bharath Raj , Priya G Real Time Working of Keylogger Malware Analysis This paper describe the working of a keystroke logger As result, keylogger is easy to understand as it as the simple task of recording and it’s illegal to use it without the victim authorization 2. Proposal method As a software, having some knowledge about software development and python is very required for understand this work to be done. The code will be written only on python, the goal here will be to create a python file, convert it into an application. The keystroke has to be send to a specific email as file and contain all the data specified in the code (Keystroke, screenshot, audio sound).
  • 5. Fig 6 : Keylogger process The exact string matching algorithm is used to match keyboard input variables with input received from the keyboard, the word will be identified as a word entered by the user. a. Algorithm 1. Beginning 2. Installing spyder and check compatibility with Python 3 3. Import libraries 4. CREATING FILES AND APPENDING TO FILES 5. LOGGING KEYS 6. Add EMAIL functions 7. Get COMPUTER INFORMATION 8. CLIPBOARD incorporation 9. SCREENSHOT, keystroke, audio 10. BUILD THE TIMER 11. ENCRYPTION OF FILES 12. Convert the python code into exe application 13. Add the software as exclusion on the antivirus 14. End
  • 6. END Fig 7 : Algorithm Libraries
  • 7.  Installing spyder : Spyder will help us to implement python as a compiler  Libraries: In computer science, a library is a collection of non-volatile resources used by computer programs, often for software development.  CREATING FILES AND APPENDING TO FILES: For multiple parts of the keylogger, we will be appending data to files. Before we append data to files, we must first create variables with the proper extensions.  LOGGING KEYS: To log keys using python, we will be using the pynput module.  EMAIL: To add an email functionality, we will be using the email module.  COMPUTER INFORMATION: To gather computer information, we will use socket  CLIPBOARD: To get the clipboard information, we will be using the win32clipboard module, which is a submodule of pywin32  MICROPHONE: To record with microphone, we will be using the sounddevice module and writing to a .wav file using the scipy.io.wavefile module.  SCREENSHOT: To take a screenshot, we will use the ImageGrab from the Pillow Module.  BUILD THE TIMER: To build a timer which goes through a certain number of iterations before the keylogger ends, we will be using the timer function.  ENCRYPTION OF FILES: To encrypt files, we will use the cryptography.fernet module. 3. Result and analysis The output of the work will be in form of file sent to a specific mail choose by the developer since the code. Keystroke logger take all record from the computer, not only stroke, it takes screenshot and audio information as mentioned above in the paper. It still remains invisible in the eye of the user but data are stocked and sent. the sending mail is also sectioned from the code as long as the receiving mail.
  • 8. Conclusion Keystroke logging attacks bypass all other controls. They are easy to implement and manage, providing attackers with useful account, identity, and intellectual property information. On the other hand, they are useful investigative tools. Controlling keylogging technology within your organization is no different than managing other threats and tools, requiring common sense and a layered defense. The key is to be aware they exist, understand how they’re used, and implement ways to detect them, with keylogger detection and containment part of your incident response plan. 4. Bibliography/References 1. Darus, Mohamad Yusof, and Muhammad Azizi Mohd Ariffin. "Enhancement Keylogger Application for Parental Control and Monitor Children's Activities." Journal of Positive School Psychology 6.3 (2022): 8482-8492. 2. Imam, Chairul, and Muhammad Furqon Siregar. "Utilization Of Key Logger In Security Aspect Based On Spyware For Monitoring Laptop Using Refog Key Logger." INFOKUM 10.1 (2021): 105-111. 3. Widyasari, Permata Ayu. "Ethical dilemma decision making based on personality: the case of installation of a keylogger system." (2021): 252-258. 4. Umarani, C., and Rajrishi Sengupta. "Keyloggers: A Malicious Attack." (2020). 5. Srivastava, Mayank, et al. "Analysis and Implementation of Novel Keylogger Technique." 2021 5th International Conference on Information Systems and Computer Networks (ISCON). IEEE, 2021.