System Surveillance Using Keylogger
System Surveillance Using Keylogger
SURVEILLANCE using
KEYLOGGER
CHINMAYEEMOTI SAHOO -170301200023
SUKANYA MOHANTY – 170301200030
SAHIL ALI KHAN - 170301200018
Objectives…..
• Captures keystrokes
Optimal stealth
Log Filtering
mode
Customizable
Auto log clearing
Setting mode
execute_keylogger.py
Program files :
Keylogger.py
1 -SMTPlib :
2 -Pynput :
It is a client session
This library allow
object that can be
you to control and
used to send mail to
monitor input
any internet machine
devices .
with SMTP domain
Module
Used :
3 -Keylogger : 4 -Threading :
Surveillance It used to run certain
technology used to code / processing in
monitor or record background and
each krey stroke without constent of
user
Key logging functionality of one company in Verisign’s recent report as rapid
growth in malicious program
Key Logger Architecture
FTP
module
Application
Internet
Application Explorer
HHook Hook
Hook
procedure procedure
Ke
procedure
Main Module
Spyrix Actual
Keylogger Keylogger
Examples of
Keylogger
Revealer
REFOG Keylogger
Keylogger
Block diagram
System requirements
•https://medium.com/
•https://www.slideshare.net/
•https://en.m.wikipedia.org/wiki/
•https://security.stackexchange.com/
•https://www.ionos.com/digitalguide/
THANKS !!!