0% found this document useful (0 votes)
86 views

System Surveillance Using Keylogger

This document discusses a keylogger system that captures keystrokes and sends emails to an administrator to monitor system activities by others. It defines keylogging, outlines its importance for IT organizations to monitor employee performance, and describes the features, program files, modules, and architecture of a keylogger. The document provides examples of keylogger software, system requirements, a keylogger process flow, and concludes with discussing legitimate and illegal uses of keyloggers and the need for dedicated protection against spyware.

Uploaded by

Ash Ketchum
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
86 views

System Surveillance Using Keylogger

This document discusses a keylogger system that captures keystrokes and sends emails to an administrator to monitor system activities by others. It defines keylogging, outlines its importance for IT organizations to monitor employee performance, and describes the features, program files, modules, and architecture of a keylogger. The document provides examples of keylogger software, system requirements, a keylogger process flow, and concludes with discussing legitimate and illegal uses of keyloggers and the need for dedicated protection against spyware.

Uploaded by

Ash Ketchum
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 22

SYSTEM

SURVEILLANCE using
KEYLOGGER
CHINMAYEEMOTI SAHOO -170301200023
SUKANYA MOHANTY – 170301200030
SAHIL ALI KHAN - 170301200018
Objectives…..

• Define Key logger

• Captures keystrokes

• Sends mail to the admin

• Monitors the system


Activities by others
CONTENTS…..
What is keylogging ?
Importance of keylogger
Features of keylogger
Pro- Features of keylogger
Program files
Modules used
Keylogger Architecture
Programming
Block diagram
System Requirement
Conclusion
Reference
What is keylogging ?
A program or Hardware device that capture every key
impression on the system.

•Used to monitor user’s activities .

•Used to retrieve data and forgotten URLs .


Importance of Key logger …
IT organizations can indicate their concerns by going
after the culprit whose performance is deteriorating
that of the whole organization .

Keylogger s/w is also available for use on smart


phones, such as iPhones and Android .
FEATURES OF KEYLOGGER
Key stroke
Web site visited
monitoring

Screen shot capturing Windows startup

Program captured Startup Alert


Pro- Features of Key logger
Remote viewing email
Log exporting
delivery

Optimal stealth
Log Filtering
mode

Customizable
Auto log clearing
Setting mode
execute_keylogger.py

Program files :

Keylogger.py
1 -SMTPlib :
2 -Pynput :
It is a client session
This library allow
object that can be
you to control and
used to send mail to
monitor input
any internet machine
devices .
with SMTP domain

Module
Used :

3 -Keylogger : 4 -Threading :
Surveillance It used to run certain
technology used to code / processing in
monitor or record background and
each krey stroke without constent of
user
Key logging functionality of one company in Verisign’s recent report as rapid
growth in malicious program
Key Logger Architecture
FTP
module
Application
Internet
Application Explorer

HHook Hook
Hook
procedure procedure
Ke
procedure

Main Module
Spyrix Actual
Keylogger Keylogger

Examples of
Keylogger

Revealer
REFOG Keylogger
Keylogger
Block diagram
System requirements

Windows 2000, Windows XP (32-bit and x64),


Windows Server 2003/2008, Windows Vista (32-bit
and x64), Windows 7, Windows 8 (32-bit and x64);
Windows 10 ,
Windows 2000 or later ,
Internet Explorer 5.0 or later ,monitor : 15”
colour ,HDD 40GB
Basic input devices required: keyboard
Basic output devices required: mobile devices
S/W requirement: PyCharm, Python 3.8.0
Technologies used: Advanced programming
using Python
Keylogger process in user activity
CONCLUSION :
 Key logger record keystrokes

 Legitimate use : monitor employee activity

 legal uses : steal password , user name and other


personal / corporate data . Reports show that there is an
increased tendency to use rootkit technologies in keylogging
software, to help the keylogger evade manual detection and
detection by antivirus solutions.

 Only dedicated protection can detect that a keylogger is


being used for spy purposes.

 Be conscious what installed in the computer.


 Use caution when snuffing the internet.
 Keep your computer software update.
REFERENCE :

•https://medium.com/

•https://www.slideshare.net/

•https://en.m.wikipedia.org/wiki/

•https://security.stackexchange.com/

•https://www.ionos.com/digitalguide/
THANKS !!!

You might also like