0% found this document useful (0 votes)
7 views46 pages

Keystroke Guardian (Keylogger) : A Major Project Report On

The document is a major project report on 'Keystroke Guardian (Keylogger)' submitted by students of the University of Mumbai for their Bachelor of Engineering in Computer Engineering. It outlines the project's purpose, which is to develop a functional keylogger application while emphasizing ethical considerations and legal compliance. The report includes sections on literature survey, system analysis, methodologies, results, future scope, and ethical implications of keylogging software.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views46 pages

Keystroke Guardian (Keylogger) : A Major Project Report On

The document is a major project report on 'Keystroke Guardian (Keylogger)' submitted by students of the University of Mumbai for their Bachelor of Engineering in Computer Engineering. It outlines the project's purpose, which is to develop a functional keylogger application while emphasizing ethical considerations and legal compliance. The report includes sections on literature survey, system analysis, methodologies, results, future scope, and ethical implications of keylogging software.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 46

A

Major Project Report


On
“KEYSTROKE GUARDIAN (KEYLOGGER)”
Submitted in partial fulfilment of the requirement of the University of

Mumbai for the Degree of Bachelor of Engineering

(Computer Engineering)

By

BUBERE HAMMAD YASIR (04)


CHOUDHARI AFTAB ELIYAS (06)
ANSARI MOHAMMAD ARSALAN MOHD. RIZWAN (01)
VISHWAKARMA NILESH PRABHUDDIN (58)
Under the guidance of
Dr. Prachi Gadhire

Department of computer Engineering

SUMAN EDUCATIONAL TRUST’S


DILKAP RESEARCH INSTITUTE OF ENGINEERING AND
MANAGEMENT STUDIES
Village: Mamdapur, Post: Neral, Tal: -Karjat, Dist.: Raigad–410101,

University of Mumbai
Academic Year 2024-2025

Suman Educational Trust’s

Dilkap Research Institute of Engineering & Management Studies

Department of Computer Engineering

Academic Year 2024-2025

CERTIFICATE

This is to certify that project entitled “KEYSTROKE GUARDIAN (KEYLOGGER)”


is a Bonafide work of Mr. Hammad Yasir Bubere, Mr. Aftab Eliyas
Choudhari, Mr. Ansari Mohammad Arsalan Mohd. Rizwan, Mr.
Vishwakarma Nilesh Prabhudin submitted to the University of Mumbai in
partial fulfilment the requirement for the award of degree of “Bachelor of
Engineering” in “Computer Engineering”.

Project Guide
(Dr. Prachi Gadhire)

Principle
Head of Department (Dr. Shashank Divgi)
(Dr. Prachi Gadhire)
Major Project Approval

This Major Project entitled “KEYSTROKE GUARDIAN

(KEYLOGGER)” by Hammad Bubere (04), Aftab Choudhari (06),


Ansari Mohd. Arsalan (01), Vishwakarma Nilesh (58), is approved for the
degree of Bachelor of Engineering in Computer Engineering.

Examiners

______________________

(Internal Examiner Name & Sign)

_______________________

(External Examiner name & Sign)

Date:

Place: DRIEMS, Neral


DECLARATION
I declare that this written submission represents my ideas in my own words and
where others' ideas or words have been included, I have adequately cited and
referenced the original sources. I also declare that I have adhered to all
principles of academic honesty and integrity and have not misrepresented or
fabricated or falsified any idea/data/fact/source in my submission. I understand
that any violation of the above will be cause for disciplinary action by the
Institute and can also evoke penal action from the sources which have thus not
been properly cited or from whom proper permission has not been taken when
needed.

______________ _________________

Mr. Hammad Bubere Mr. Aftab Choudhari


Department of Computer Department of Computer
Engineering Engineering

______________ __________________

Mr. Ansari Mohd. Arsalan Mr. Nilesh Vishwakarma


Department of Computer Department of Computer
Engineering Engineering

Date: -
ACKNOWLEDGEMENT
There are at times in such projects when the clock beats you time and again and again you run
out of energy and you just want to finish it once and forever. At such time a number of people
have generously given helpful comments and support during the preparation of this project.
They help us in every difficult step due to which our burden has been made simpler.

We would like to express our gratitude and appreciation to all those who gave us the
possibility to complete this project and this report. I and my team thank our head of
department Dr. Prachi Gadhire for giving us the accessory environment to acquire
knowledge and skill. A special thanks to Dr. Prachi Gadhire Mam, whose help, stimulating
suggestions and encouragement, helped us to coordinate our project especially in writing this
report. We wish to express our sincere thanks to Dr. Shashank Divgi, Principal, Dilkap
Research Institute of Engineering and Management Studies and would like to acknowledge
specifically for giving guidance, encouragement and inspiration throughout the academics.

We would also like to acknowledge with much appreciation the crucial role of the staff of
Computer Laboratory, who gave the permission to use all required machinery and the
necessary material to complete the report special thanks goes to our friends, who gave
suggestions about the source code.

Hammad Bubere

Aftab Choudhari

Ansari Mohammad Arsalan

Vishwakarma Nilesh

Date:

Place:
TABLE OF CONTENTS

CHAPTER TITLE PAGE


NO. NO.

ABSTRACT

1 INTRODUCTION 1

1.1 Background

1.2 Purpose of the Project

1.3 Relevance and scope

1.4 Ethical Considerations

2 LITERATURE SURVEY 7

2.1 Survey of Existing tools and software

2.2 Gaps in the Literature

2.3 Research Paper

3 OBJECTIVES 13

4 SYSTEM ANALYSIS 16

4.1 EXISTING SYSTEM

4.2 PROPOSED SYSTEM

4.3 PROBLEM STATEMENT

4.4 DETAIL OF HARDWARE AND


SOFTWARE

5 METHODOLOGIES 24

6 RESULT 27

7 FUTURE SCOPE 32

8 CONCLUSION 35
9 REFERENCES 37
LIST OF FIGURES

SR NO. Names Of Figures Page No.

1 Basic Workflow Diagram 2

2 Keylogger Distribution (Language) 3

3 Application of Keylogger in Various Domain 5

4 PS/2 Keylogger 17

5 USB Keylogger 17

6 Gui Setup window 28

7 Checkbox 29

8 Stop Application 30

9 Logged Key File 30

10 System Information File 30

11 Help page 31
ABSTRACT
Keystroke Guardian is a tool designed to monitor and record all keyboard activity on a target
device. This type of software, often called a keylogger, captures keystrokes made by the user,
including typed text, passwords, and other sensitive information. Typically, keyloggers are
used for monitoring user behavior, but they also have the potential for malicious exploitation.
Keystroke Guardian offers features such as real-time logging, data storage, and activity
analysis.
While keyloggers have a valid role in parental control, corporate security, and forensic
investigations, their use is often controversial due to privacy concerns and the potential for
misuse. Ethical usage should involve proper consent, notification, and compliance with legal
regulations.

The Guardian keylogger differs from traditional keyloggers by adding encryption and secure
storage features to protect captured data from unauthorized access. It also includes alert
mechanisms to inform administrators of suspicious activity and allows for granular control
over monitoring, ensuring that only authorized actions are tracked.

The software is designed with multiple applications in mind. It can be employed in a


corporate environment to ensure that employees adhere to organizational policies, for parental
control to monitor children's online activity, and for forensic purposes to recover lost data or
investigate incidents involving cybercrime. Unlike traditional keyloggers, which have often
been associated with malware and spyware, Keystroke Guardian emphasizes ethical usage. It
includes built-in safeguards to prevent misuse, ensuring that monitoring occurs with proper
consent and transparency.

The main purpose of keyloggers is to tamper with the chain of events that occur when a key is
pressed, and information is displayed on the screen as a result of the keystroke. Keyloggers
can be used for both lawful and illegitimate objectives, depending on the user who is utilizing
it. Keyloggers for systems, i.e., for identifying fraudulent users, can be used by system
administrators. Keyloggers can help a computer forensics analyst examine digital files more
effectively. Keyloggers are extremely useful for keeping track on ongoing criminal activity.
KEYSTROKE GUARDIAN (KEYLOGGER)

CHAPTER 1

INTRODUCTION

DRIEMS 1
KEYSTROKE GUARDIAN (KEYLOGGER)

INTRODUCTION

1.1 Background

Software Key loggers, also known as keystroke loggers, record the keys hit on a device and
save them to a file, which is then accessed by the person who deployed the malware. A key
logger can be either software or hardware. A hardware keylogger is a device that connects
your keyboard to your computer. Keyloggers can be connected directly to the keyboard and
the computer through manually using one of two approaches. PS/2 and the USP keylogger are
two examples of this method. Acoustic keylogger, unlike hardware keyloggers, analyses the
sound of individual keystrokes is recorded. To react to the sound of the user's typing, special
equipment is needed. The sound of the keyboard was picked up from hundreds of feet away
using a parabolic microphone, which was designed to record over a long distance The main
goal of this wireless keylogger is to intersect broadcast packets from a wireless keyboard that
engage a 27 MHz RF link to transfer translated RF keystroke characters. It keeps track of
keystrokes, saves them in a secure location, and subsequently sends them to the keylogger's
author.

DRIEMS 2
KEYSTROKE GUARDIAN (KEYLOGGER)

Fig Fig1.BASIC WORKFLOW DIAGRAM

Fig 2. KEYLOGGER DISTRIBUTION (LANGUAGE)

It’s worth noting that most keyloggers are developed in Objective-C due to its ease of
implementing the necessary functionality, as it is a native programming language.

In the modern digital age, where computers are integral to both personal and professional life,
the importance of understanding cybersecurity tools and threats cannot be overstated. One
such powerful yet controversial tool in the cybersecurity landscape is a Keylogger. A
keylogger (short for keystroke logger) is a type of surveillance software or hardware designed
to record every keystroke made on a computer or mobile keyboard. While it is often
associated with malicious intent, keyloggers are also used legitimately for monitoring and
auditing activities.

Keyloggers have drawn significant attention from researchers, IT professionals, and ethical
hackers due to their dual-use nature. They play a crucial role in penetration testing, user
behavior monitoring, parental control, and employee surveillance. At the same time, they
pose a serious threat when used without the user’s consent, such as in identity theft,
credential harvesting, and espionage.

This project aims to explore the design, development, functionality, and ethical

DRIEMS 3
KEYSTROKE GUARDIAN (KEYLOGGER)

implications of a keylogger system. The project involves the creation of a software-based


keylogger using programming languages such as Python or C++, capable of capturing and
logging keyboard inputs, saving them in a structured file format, and optionally sending the
data to a remote location for analysis.

1.2 Purpose of the Project

The primary goal of this project is to develop a functional keylogger application to


demonstrate how such tools operate in real-world scenarios. Through this project, students
will gain hands-on experience in:

 System-level programming

 File I/O operations

 Logging and data handling

 Background services

 Ethical hacking and digital forensics

This project not only deepens technical knowledge but also promotes awareness about
cybersecurity threats and defense mechanisms.

1.3 Relevance and Scope

With the rise in cybercrime, understanding how keyloggers work is essential for cybersecurity
professionals. This project covers both the technical and ethical dimensions of keyloggers,
making it relevant for students pursuing degrees in:

 Computer Science

 Information Technology

 Cybersecurity

 Software Engineering

The scope of this project includes:

 Development of a basic keylogger

 Capturing and storing keystrokes

 A discussion of ethical boundaries and legal frameworks

DRIEMS 4
KEYSTROKE GUARDIAN (KEYLOGGER)

By working on this project, students can appreciate the fine line between ethical monitoring
and malicious spying. The application will be developed purely for educational and ethical
purposes.

Fig 3. Application of Keylogger in Various Domains

1.4 Ethical Considerations

One of the most critical aspects of this project is understanding the ethical implications of

DRIEMS 5
KEYSTROKE GUARDIAN (KEYLOGGER)

keylogging software. While it can be used for legitimate purposes, such as employee
monitoring or parental control, unauthorized keylogging is illegal and considered a serious
breach of privacy.

This project emphasizes the following ethical guidelines:

 The application should be used only on systems the user owns or has permission to
monitor.

 It must not be used to spy on individuals without informed consent.

 The project report includes a detailed section on legal and ethical usage.

 Any deployment must comply with local cyber security laws and regulations.

Students are encouraged to study relevant laws such as the Information Technology Act
(India), Computer Fraud and Abuse Act (USA), and GDPR (Europe) before testing or
deploying any keylogger software.

DRIEMS 6
KEYSTROKE GUARDIAN (KEYLOGGER)

CHAPTER 2
LITERATURE SURVEY

DRIEMS 7
KEYSTROKE GUARDIAN (KEYLOGGER)

LITERATURE SURVEY

2.1 Survey of Existing Tools and Software

Tool/Research Features/Findings Limitations

Proprietary, limited
Commercial parental and employee
Refog Keylogger customization, privacy
monitoring with stealth features.
concerns.

Records keystrokes, clipboard, and audio; Detected by antivirus tools,


Ardamax Keylogger
supports email delivery. may be used unethically.

Basic free tool with screenshot capture No encryption, lacks


Actual Keylogger
and log analysis. modularity.

Research by A. Kumar Demonstrated keylogger development in No encryption or ethical


(2017) C++ with system API hooking. control discussed.

Proposed anomaly-based detection


"Malicious Keylogging Focused on defence, not
models for identifying unauthorized
Detection" – ACM Journal educational tools.
keyloggers.

2.2 Gaps in the Literature


Despite a large body of work on keylogging detection and the misuse of keyloggers, there is
limited academic literature on:

 Secure and encrypted keylogger development for education

 Ethical simulation of keyloggers in penetration testing labs

 Controlled deployment of keyloggers with consent and transparency

2.3 Research Paper

1. Keylogger: The Unsung Hacking Weapon: Adi Badiozaman Bin Ruhani,


Muhamad Fadli Zolkipli Vol 6 No 1 (2023): March Submitted: Feb 20, 2023
Published: Mar 2023
This paper provides an overview of keyloggers as a tool for hacking and the potential

DRIEMS 8
KEYSTROKE GUARDIAN (KEYLOGGER)

threats they pose to individuals and organizations. It explores the history of


keyloggers, the types of keyloggers, how they work, and the different techniques used
to detect and prevent keylogger attacks. The paper discusses the different types of
keyloggers that exist, including hardware and software keyloggers, and explains how they
can be used to steal sensitive data. The study also outlines the detection and prevention
techniques used to combat keylogger attacks, such as anti-virus software, network traffic
analysis, and biometric authentication. The effectiveness of each method is discussed,
along with its limitations. The paper emphasizes the need for increased awareness and
education on the risks of keylogger attacks and the importance of implementing best
practices for information security. It also provides a literature review on keylogger attacks
and discusses the future trends in combating keylogger threats, such as advanced
encryption techniques, enhanced biometric authentication, and Threat Intelligence
solutions. The study concludes that keylogger attacks are a growing threat and that
organizations and individuals need to take necessary steps to protect their sensitive data.
Overall, this paper serves as a comprehensive guide to understanding keyloggers as a tool
for hacking and the measures that can be taken to prevent and detect keylogger attacks.

2. A. Ahad, M. S. Khan and P. Saxena, "Analysis of Keylogging spyware for


information theft," 2023 1st International Conference on Intelligent Computing and
Research Trends (ICRT), Roorkee, India, 2023
Although the continued advancement of technology has undoubtedly made our lives easier, it
has also made it possible for thieves like hackers and intrusions to track our internet activities
in sophisticated ways. Few cyber risks have developed to the point where they could be able
to get past any software’s defence. Keyloggers is a best-of-best example of the "silent" cyber
threats – they give easy access to your personal data like username, Password, Date-of-Birth,
etc to hackers but as it may be nearly impossible to detect until. A keylogger is a tool that is
used by the intruder/hackers to monitor all the activities or record the keystrokes that you
make on your keyboard device. Whether they are run or installed on your operating system or
embedded with the hardware, few keyloggers are very difficult to detect by Antivirus. Aside
keylogger is utilized for revengeful purpose like gathering account information, numbers,
names, passwords, and other personal data, it could be use in office on your company to spy
on your employees, at home to observe your children’s activities and by legislation imposition
to inspect and follow occurrences connected to the implementation of PCs. This project will

DRIEMS 9
KEYSTROKE GUARDIAN (KEYLOGGER)

solely use Python 3. (version 3.10.7). Multiple modules, such as pynput, smtplib, urllib,
multiprocessing, date time, as well as email Message, will be implemented by me. These
modules are not standard Python modules and must be installed. I’m planning to write
software to monitor keystrokes on the keyboard and save them to an output file. To expand
the project, I will also include a feature that will periodically (every 60 seconds) check for an
internet connection. If one is found, the logs will be transmitted immediately to an email;
otherwise, keystrokes will be recorded.

3. D. Damopoulos, G. Kambourakis, S. Gritzalis “From keyloggers to touch loggers:


Take the rough with the smooth” Info-Sec-Lab Laboratory of Information and
Communications Systems Security, Department of Information and Communication
Systems Engineering, University of the Aegean, Samos GR-83200, Greece
The proliferation of touchscreen devices brings along several interesting research
challenges. One of them is whether touch stroke-based analysis (similar to keylogging)
can be a reliable means of profiling the user of a mobile device. Of course, in such a
setting, the coin has two sides. First, one can employ the output produced by such a
system to feed machine learning classifiers and later on intrusion detection engines.
Second, aggressors can install touch loggers to harvest user's private data. This malicious
option has been also extensively exploited in the past by legacy keyloggers under
various settings, but has been scarcely assessed for soft keyboards. Compelled by these
separate but interdependent aspects, we implement the first-known native and fully
operational touch logger for ultramodern smartphones and especially for those
employing the proprietary iOS platform. The results we obtained for
the first objective is very promising showing an accuracy in identifying misuses, and
thus post-authenticating the user, in an amount that exceeds 99%. The virulent
personality of such software when used maliciously is also demonstrated through real-
use cases.
4. Robbi Rahim, Heri Nurdiyanto, Ansari Saleh “Keylogger Application to
Monitoring Users Activity with Exact String-Matching Algorithm” IOP Conf.
Series: Journal of Physics: Conf. Series 954 (2018) 012008

The development of technology is very fast, especially in the field of Internet


technology that at any time experiencing significant changes, The development also

DRIEMS 10
KEYSTROKE GUARDIAN (KEYLOGGER)

supported by the ability of human resources, Keylogger is a tool that most developed
because this application is very rarely recognized a malicious program by antivirus,
keylogger will record all activities related to keystrokes, the recording process is
accomplished by using string matching method. The application of string-matching
method in the process of recording the keyboard is to help the admin in knowing what
the user accessed on the computer.

5.Mayank Srivastava; Anjali Kumari; Krishan Kant Dwivedi; Sakshit Jain;


“Analysis and Implementation of Novel Keylogger Technique” Publisher: IEEE
Published in: 2021 5th International Conference on Information Systems and
Computer Networks (ISCON)
Keystroke logging, also known as keystroke or keyboard scanning, is a way to record
the keys that are being typed on the keyboard, by the user's computer or keyboard, so
that the keyboard user does not know that their details are being tracked. Data can be
gained by someone using the login system. Some programs themselves are legal, and
are created to track the use of employer's computer. Key logging is also used to learn
keystroke power or human-computer interconnection. Many methods for key chain are
available, which are software or hardware-based methods or acoustic crypt-analysis. In
this paper, we have proposed a key logger that captures the keystrokes of the victim as
well as the running applications on which the victim might be working, and stores it in
an encrypted form in a file, which is further uploaded on the server after every hour. It
also records extra information of the victim like it's IP address, MAC Address, and
Username. The software runs on a stealth mode, that is it uses very low RAM. It re-
launches itself as soon as the system starts.
The keystrokes are stored in an encrypted form in the file and then uploaded on server,
which is later downloaded and decrypted by the attacker.

DRIEMS 11
KEYSTROKE GUARDIAN (KEYLOGGER)

CHAPTER 3
OBJECTIVES

DRIEMS 12
KEYSTROKE GUARDIAN (KEYLOGGER)

OBJECTIVES

Keystroke Guardian: An Advanced Keylogger

The objective of the Keystroke Guardian project is to develop an advanced keylogging system
with enhanced security and privacy features. The keylogger will operate in stealth mode,
ensuring that it remains undetectable during operation. The logged keystrokes will be
captured accurately and securely, with all collected data being encrypted to protect it from
unauthorized access. This project will also explore additional functionalities, such as user-
specific tracking, remote data access, and tamper-resistant logging, to enhance both
functionality and ethical usage. The final product will be evaluated on its performance,
security, and ethical implications in real-world scenarios, focusing on responsible deployment
in environments requiring high levels of data confidentiality and monitoring.

The Keystroke Guardian is a sophisticated keylogging software designed for monitoring and
recording keyboard input. This project focuses on capturing keystrokes efficiently while
maintaining discretion through a stealth mode, ensuring it operates undetectably. One of the
key features of Keystroke Guardian is its robust data encryption mechanism, which securely
encrypts the logged data to prevent unauthorized access or tampering.

Key features of Keystroke Guardian include:

1. Keylogging: The core functionality of the software is to record all keystrokes made by
the user. The data is captured in real-time and stored in a secure log file for later
analysis.

2. Stealth Mode: To ensure that the keylogger remains undetectable during its operation,
it operates in stealth mode. This mode hides the application from common detection
mechanisms such as Task Manager, Startup programs, and system processes, making
it nearly invisible to the user.

3. Data Encryption: To protect sensitive data from potential misuse, the logged
keystroke data is encrypted using advanced encryption algorithms. This ensures that
even if the data is intercepted, it remains secure and unreadable without the proper

DRIEMS 13
KEYSTROKE GUARDIAN (KEYLOGGER)

decryption key.

4. Log Management and Export: The software allows for easy retrieval and
management of the logged data. Users can export the encrypted logs for further
analysis or storage, ensuring a seamless and secure way to handle sensitive
information.

5. Customizable Settings: The Keystroke Guardian provides a user-friendly interface to


configure various options such as logging frequency, encryption strength, and alert
notifications.

The Keystroke Guardian serves as an efficient tool for monitoring purposes while adhering to
stringent security protocols through encryption, making it a comprehensive solution for both
personal and professional usage.

DRIEMS 14
KEYSTROKE GUARDIAN (KEYLOGGER)

CHAPTER 4
SYSTEM ANALYSIS

DRIEMS 15
KEYSTROKE GUARDIAN (KEYLOGGER)

SYSTEM ANALYSIS

4.1 EXISTING SYSTEM

The existing model of the current problem statement is the traditional style of transferring
data using keylogger is very costly and not for the small purpose. However, we have
keylogger which is basically used for monitoring payments and, PINs, and passwords as a
result. Without drawing the user's attention. A hardware keylogger is a device that connects
your keyboard to your computer. Keyloggers can be connected directly to the keyboard and
the computer through manually using one of two approaches. PS/2 and the USP keylogger are
two examples.

Fig 4.PS/2 Keylogger Fig 5.USB Keylogger


Hardware, acoustic, wireless intercept are the three basic types of keyloggers. These
keyloggers All of them have one thing in common: they keep track of the sensitive
information they collect in a log file. Despite the fact that they have varied ramifications and
information grabbing processes.

Keylogger (hardware): -
A hardware keylogger is a tool that fits between the keyboard and the computer.
Keyloggers can be linked to the keyboard physically and computer using one of two
approaches. PS/2 and the USP keylogger are two examples of this method.
The second technique requires the insertion of a keylogger circuit within the

DRIEMS 16
KEYSTROKE GUARDIAN (KEYLOGGER)

keyboard standard rather than a physical connection to the PC. This strategy has the
advantage of not requiring users to physically monitor keyloggers.

Keylogger with audible input: -


Acoustic keylogger, unlike hardware keyloggers, analyses and records the sound of
individual keystrokes. Special equipment is necessary to listen to the sound of the
user's typing. The sound of the keyboard was picked up from hundreds of feet away
using a parabolic microphone, which was designed to record over a long distance.

Keylogger on the go: - Bluetooth connections have been used by wireless keyloggers to send
information to a log file. over a distance of up to 100 meters. The main goal of this wireless
8keylogger is to intercept broadcast packets from a wireless keyboard that engage a 27 MHz
RF link to transfer translated RF keystroke characters. The disadvantage of this wireless
keylogger is
that it requires a receiver/antenna that is somewhat close to the target region work. Figure 3
depicts a Bluetooth-enabled keylogger.

DRIEMS 17
KEYSTROKE GUARDIAN (KEYLOGGER)

4.2 PROPOSED SYSTEM

The proposed system introduces an intuitive user interface (UI) that simplifies the
installation process, ensures user consent through explicit terms and conditions, and
provides a dedicated help section for guiding users through the setup and functionalities.
Once the user accepts the terms, the keylogger operates stealthily in the background,
securely capturing keystrokes while adhering to data encryption standards to protect
sensitive information.

The proposed system offers a GUI that enhances the installation experience by making it
straightforward and user-centric. The interface will have the following features:
 Installation Wizard: The system guides the user through a step-by-step installation
process with clear instructions.
 System Requirements Check: The GUI checks for compatibility with the user's
system, ensuring smooth operation on various operating systems (e.g., Windows,
macOS, Linux).
 Customization Options: The user can configure basic settings during installation,
such as the log file location, encryption preferences, and notification settings (if
required).

The GUI design is minimalist, ensuring ease of use without overwhelming the user with
technical jargon.

Terms and Conditions for User Consent

As the Keystroke Guardian is designed for ethical use, it is crucial to include a detailed
Terms and Conditions section, which ensures user consent and informs them of their legal
obligations. This section will clearly outline:

 The purpose of the keylogger (e.g., for monitoring employees or personal use)
 A description of the data being collected (e.g., keystrokes, timestamps, applications
used)
 A reminder about respecting privacy and legal boundaries, especially for corporate use
 Details of the data encryption process for safeguarding sensitive information

DRIEMS 18
KEYSTROKE GUARDIAN (KEYLOGGER)

User rights, including the ability to uninstall or stop the keylogger

The keylogger will only begin its operation after the user accepts the terms. If the user
declines, the installation process will be aborted.

Help Section for User Guidance

A dedicated Help button will be available in the GUI during installation and after
deployment. This section provides detailed documentation, video tutorials, and FAQs for
users who may require assistance. The help section will cover:

 How to install and configure the keylogger


 How to review logs and reports
 How to uninstall or pause the keylogger
 Troubleshooting tips for common issues

The goal is to make the keylogger accessible to both technical and non-technical users,
ensuring that they can use the tool efficiently.

Stealth Keylogging and Secure Data Storage

Once the user accepts the terms and completes the installation, the keylogger will begin its
stealth operations. Keylogging occurs in the background without visible traces in task
managers or system processes. Key features include:

 Real-Time Keystroke Logging: Captures all keystrokes across all applications,


ensuring no data is missed.
 Application and Timestamp Logging: Logs the application in use and timestamps
each keystroke for a detailed activity report.
 Minimal Resource Usage: The keylogger operates without affecting system
performance, ensuring it remains undetected.

Logs are securely stored in encrypted files to prevent unauthorized access.

User Authentication and Access Control

To ensure that only authorized individuals can access the logged data, the system will include:

DRIEMS 19
KEYSTROKE GUARDIAN (KEYLOGGER)

 User Authentication: Password protection to access the keylogger's logs and settings.
Access Logs: A feature that tracks when and by whom the logs were accessed to ensure
transparency and accountability.
This ensures that sensitive data remains secure and is not accessed by unauthorized users.

Data Encryption and Log Management

Security is paramount in the Keystroke Guardian system, so all captured data is stored in
encrypted form. Key elements include:

 Encryption Standards: Use of AES-256 encryption to secure data both at rest and
during transmission (if logs are sent remotely).
 Log Rotation and Auto-Deletion: To prevent excessive data accumulation, the
system automatically rotates and deletes old logs based on a set schedule, ensuring
efficient log management and preventing storage overload.
 Export Options: Logs can be securely exported to a specified location, and options
for exporting in various formats (CSV, JSON, etc.) will be available for further
analysis.

DRIEMS 20
KEYSTROKE GUARDIAN (KEYLOGGER)

4.3 PROBLEM STATEMENT


Keylogger Management and Mitigation – Key Points for White Hat Hackers:
Keylogger Management:
 Focuses on identifying keyloggers that have already infected a system.
 Involves effective removal techniques to eliminate threats.
Keylogger Mitigation:
 Aims to limit the permissions and capabilities of potential keyloggers.
 Reduces the impact of a keylogger even if it manages to infiltrate the system.
Application Network Activity:
 Applications with incoming or outgoing network activity can act as infection path-
ways.
 These apps must be closely monitored to prevent unauthorized system access.
Security vs. Functionality:
 Designing applications with a focus on security significantly lowers the risk of infec-
tion.
 However, there are limits to how much functionality can be compromised for the sake
of security.

DRIEMS 21
KEYSTROKE GUARDIAN (KEYLOGGER)

4.4 DETAILS OF HARDWARE AND SOFTWARE


Hardware Requirements for Development:
 Minimum 64 MB RAM
 Pentium Class or Higher Processor
 20 MB free Disk Space

SOFTWARE REQUIREMENTS:
 Operating System: Window 7 or higher
 IDE: Python IDE or VS Code
 Libraries: Pynput, Cryptography Fernet, Pywin 32, Smtplib

DRIEMS 22
KEYSTROKE GUARDIAN (KEYLOGGER)

CHAPTER 5
METHODOLOGIES

DRIEMS 23
KEYSTROKE GUARDIAN (KEYLOGGER)

METHODOLOGIES
Environment
Keylogging is utilized for a variety of purposes. It is used to track Internet activity for
company security, parental control, and schools. A keylogger secretly captures
everything you do, including what you type in a word document, emails, online
conversations, and Internet usage. Because a keylogger captures all keystrokes, you
may see the user's name and password as they put it into a form in plain text.
Furthermore, if utilizing secure email

Tkinter
With help of this library GUI is created to provide easy user interface for people who don’t
have much technical information. Tkinter is Python’s standard GUI library used for
developing desktop applications with interactive interfaces. The main window is initialized
using Tk(), and various widgets like Label, Button, and Entry are added to build the interface.
Widgets are arranged using geometry managers such as pack(), grid(), or place(). Event
handling is done using the command parameter or bind() method, allowing the application to
respond to user interactions. The GUI runs within a continuous loop using mainloop(), and
additional features like message boxes, file dialogs, and styling can be added through built-in
modules like tkinter.messagebox and ttk. For smoother user experience, threading or the
after() method is used to handle background tasks without freezing the interface.

Webbrowser
This module is used to open help page for user.

Pynput.keyboard
This library allows you to control and monitor input devices .The pynput library in Python is
commonly used for monitoring and controlling keyboard input, making it ideal for keylogging
and automation tasks. Using pynput.keyboard, a listener is created to detect key presses and
releases in real-time. The Listener class is initialized with on_press and on_release callback
functions to handle user input. Keys are identified using the Key and KeyCode classes,
allowing distinction between special keys (like Shift or Enter) and alphanumeric keys.

DRIEMS 24
KEYSTROKE GUARDIAN (KEYLOGGER)

Fernet
Fernet assures that a communication encrypted with it cannot be modified or read.

Platform
The platform module provides functions to retrieve information about the underlying
platform, including:
1. Operating System (OS)
2. Hardware architecture
3. Processor type

Socket
A request for the page's text can be sent using the socket s. The response will be
read via the same socket.

Clipboard(win32clipboard)
It is utilized to achieve cross-platform copy and pasting in Python. It is a cross
platform library, making it usable in different operating systems to capture clipboard
information

DRIEMS 25
KEYSTROKE GUARDIAN (KEYLOGGER)

CHAPTER 6
RESULT

DRIEMS 26
KEYSTROKE GUARDIAN (KEYLOGGER)

RESULT

Fig 6. Gui setup window


 Select checkbox to enable RUN option

 Select OK to continue.

 To start the application press run button

DRIEMS 27
KEYSTROKE GUARDIAN (KEYLOGGER)

Once RUN button is pressed the application will continue to run in background.

Fig 7. CHECKBOX

DRIEMS 28
KEYSTROKE GUARDIAN (KEYLOGGER)

To stop the application press Esc button.

Fig 8. Application Esc Button


Logged key file

Fig 9. Logged Key File


System information file

Fig 10. System Information File

DRIEMS 29
KEYSTROKE GUARDIAN (KEYLOGGER)

Fig 11. Help Page

DRIEMS 30
KEYSTROKE GUARDIAN (KEYLOGGER)

CHAPTER 7
FUTURE SCOPE

DRIEMS 31
KEYSTROKE GUARDIAN (KEYLOGGER)

FUTURE SCOPE.

1. Cybersecurity and Ethical Monitoring


One of the most significant future scopes of keyloggers lies in ethical usage for cybersecurity.
Keyloggers can help in identifying potential security breaches by monitoring and analyzing
keystrokes in real time. In highly secure environments, keylogging software could be
integrated into security protocols to detect unusual typing patterns that may indicate the
presence of malware or unauthorized access.

In corporate settings, keyloggers are likely to evolve as legitimate tools for employee activity
monitoring. Businesses may use these tools to track productivity, ensure compliance with
security policies, and prevent the misuse of sensitive information. With growing concerns
about insider threats, keyloggers could play a vital role in identifying suspicious behaviors
before they escalate into significant security incidents.

2. Integration with AI and Machine Learning

The combination of keyloggers with AI and machine learning (ML) algorithms will likely
expand their capabilities. AI-powered keyloggers could learn and adapt to the typing habits of
individuals, making it easier to detect anomalies or suspicious behaviors. This could improve
the precision of detecting threats, especially for financial institutions or government entities
where high-level security is crucial.

Machine learning can also be employed to analyze vast amounts of keystroke data, enabling
pattern recognition that helps identify potential risks. For instance, unusual keystroke patterns
might indicate a compromised system or a human-computer interaction that deviates from
normal behavior, helping to prevent keyloggers from being used maliciously.

3. Enhancements in Hardware Keyloggers

The future may witness advances in hardware-based keyloggers, particularly with the
development of smaller, more efficient devices. These could be deployed in highly secure
environments for ethical purposes such as forensic investigations, especially where software-
based solutions are inadequate or susceptible to tampering.

DRIEMS 32
KEYSTROKE GUARDIAN (KEYLOGGER)

4. Increased Usage in IoT and Wearable Devices

As IoT devices and wearables continue to proliferate, keyloggers may find new applications
in these domains. Voice-activated assistants, smartwatches, and other wearable devices that
track user activity are ripe for keylogging technology. Keyloggers could capture more than
just traditional keyboard input, expanding to capture patterns from voice commands, gestures,
and even eye movements in augmented or virtual reality systems.

The data captured from these sources could be used both positively, for user behavior
analysis, and negatively, for malicious purposes. The scope for IoT keyloggers also extends to
smart homes and connected vehicles, where they could be used to track the interactions
between users and smart devices.

DRIEMS 33
KEYSTROKE GUARDIAN (KEYLOGGER)

CHAPTER 8

CONCLUSION

DRIEMS 34
KEYSTROKE GUARDIAN (KEYLOGGER)

CONCLUSION
A keylogger is a type of software or hardware that records keystrokes made on a computer or
mobile device. Keyloggers can be used for legitimate purposes, such as monitoring employee
activity or tracking keyboard usage patterns.

In this way we have created keystroke guardian for monitoring and analyzing the activity of
child for parental control and for corporate to keep track of their employee activity if anything
happens, they can back track.

Keyloggers are sophisticated tools that can access not only the platform, but also the user's
private information like their name, password, pin, card and bank statement. While some
keyloggers are utilized in a legal manner, the creators of many keyloggers do so unlawfully.

Types of Keyloggers

1. Software-based keyloggers

2. Hardware-based keyloggers

3. Remote keyloggers

4. Kernel-level keyloggers

Keylogger Detection and Prevention

1. Install anti-virus software

2. Use firewall protection

3. Monitor system activity

4. Use encryption

5. Implement secure password practices

6. Use keyboard encryption software

7. Regularly update software and operating system

DRIEMS 35
KEYSTROKE GUARDIAN (KEYLOGGER)

CHAPTER 9
REFRENCES

DRIEMS 36
KEYSTROKE GUARDIAN (KEYLOGGER)

REFERENCES
1) Keylogger: The Unsung Hacking Weapon: Adi Badiozaman Bin Ruhani, Muhamad
Fadil Zolkipli Vol 6 No 1 (2023): March Submitted: Feb 20, 2023 Published: Mar
2023
2) A. Ahad, M. S. Khan and P. Saxena, "Analysis of Keylogging spyware for
information theft" 2023 1st International Conference on Intelligent Computing and
Research Trends (ICRT), Roorkee, India, 2023
3) https://www.scribd.com/document/616953161/Research-Paper-on-keyloggers
4) D. Damopoulos, G. Kambourakis, S. Gritzalis “From keyloggers to touch loggers:
Take the rough with the smooth” Info-Sec-Lab Laboratory of Information and
Communications Systems Security, Department of Information and Communication
Systems Engineering, University of the Aegean, Samos GR-83200, Greece
5) Robbi Rahim, Heri Nurdiyanto , Ansari Saleh “Keylogger Application to
Monitoring Users Activity with Exact StringMatching Algorithm” IOP Conf.
Series: Journal of Physics: Conf. Series 954 (2018) 012008
6) Mayank Srivastava, Anjali Kumari, Krishan Kant Dwivedi, Sakshit Jain, “Analysis
and Implementation of Novel Keylogger Technique” Publisher: IEEE Published in:
2021 5th International Conference on Information Systems and Computer Networks
(ISCON)

DRIEMS 37

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy