Professional Documents
Culture Documents
Submitted by
KRISHNA M P (921318104102)
NESAMANI S (921318104125)
RAVI SHANKAR S (921318104154)
VIGNESH J (921318104222)
of
BACHELOR OF ENGINEERING
IN
COMPUTER SCIENCE AND ENGINEERING
1
ANNA UNIVERSITY : CHENNAI 600 025.
AUGUST 2021
Certified that the project report " Keylogger using Python " is the bonfide
work of " KRISHNA M P (921318104102) , NESAMANI S (921318104125) ,
RAVI SHANKAR S (921318104154), VIGNESH J (921318104222)" who
carried out the Mini Project (CS8611) under my supervision.
SIGNATURE SIGNATURE
2
Submitted for viva voce examination held on 10-08-2021
ACKNOWLEDGEMENT
With warm hearts, I feel very pleased to thank the Almighty for his
Showers of Grace and Blessings which led me to the successful completion of
this project. I would like to express my gratitude towards my parents for their
kind co-operation and encouragement which help me in the completion of this
project.
We take this opportunity to express my sincere thanks to the respected
chairperson Tmt .K.DHANALAKSHMI AMMAL, who is the guiding light for
all the activities in my college. I would like to express my gratitude to our pro-
Chairman Rtn.Thiru R.S.K RAGURAAM, D.A.E, M.com, for their
continuous support towards the student's development.
We would like to thank our Principal Dr. D.VASUDEVAN,M.E., Ph.D.,
for being a light in guiding every one of us and infusing us the strength and
enthusiasm to work over successfully.
3
We express all my thanks & gratitude to Dr.D.SHANTH1, M.E., Ph.D.,
Professor and Head, Department of Computer Science and Engineering for her
valuable suggestions and encouragement in the completion of this project work.
The project would not be possible without the motivation and guidance
Mr.N.SELVAGANESH.,M.E., Assistant Professor of Department of Computer
Science and Engineering.
4
ABSTRACT
Here the project is developing a windows app for pc called key stroke
analysis. Key logger is a application used for for action of tracking the
keys when ever user presses keyboard, keyword strokes are captured in
converted manner so users are unaware that their actions are
monitored.
This software also contain that action of capturing the desktop if a person
is using the mouse or joystick instead of keyboard that can ultimately be
stored in a hidden log file that log file is being viewed by administrator
only. It can be accessed by administrator only. This technology can be
used for finding out all the sites and files which are being accessed by
any
person in the administrator’s absence.
The project can be used for proper identification and authentication. The
typing dynamics can be used for different user profiles. Thus this
becomes a valid tool for ascertaining personal identity
5
Table Of content
Chapter no Title Page No
Abstract 4
1 Introduction 6
1.2 Motivation 10
2 System Analysis 11
3 System design 14
6
2.3 UML diagram 14
4.2 Testing 20
5.1 Result 22
5.2 Conclusion 22
5.3 Reference 23
Chapter 1
Introduction
1.1 Motivation
This section tells about the motivation for this master thesis,
keylogging,
and the importance around that topic. All of the following articles
contains different virtual technologies, hacker attacks that are mentioned
gave interest for making a proposal of problem statements to solve. Here
are two interesting cases around the topic keylogging, found in
11
newspapers on the Internet. One article from year 2005 and the other
from recently year 2014, that shows that keylogging are used for several
years.
12
CHAPTER 2
SYSTEM ANALYSIS
13
System analysis is a problem solving technique that decomposes
a system in to its component pieces for the purpose of studying how
well those component parts work and interact to accomplish their
purposes. System analysis is the process of studying a procedure or
business in order to identify its goals and purposes and create systems
and procedures that will achieve them in an efficient way. Analysis and
synthesis, as a scientific methods, always go hand in hand; they
complement one another. Every synthesis is built up on the results of a
preceding analysis, and every analysis requires a subsequent synthesis
in order to verify and correct its results.
Here the windows app which already exist captures just the key
strokes. since the application is hidden user is unaware that his actions
are monitor
14
So here in the mini project we want to develop the code for the
windows app by using the languages python here we would like to
include certain extra features to the key logger such as recording
Keystroke activity and sending it into E-mail at regular intervals for
remote viewing , logs are encrypted. The application is very easy to use
so that customers feel happy while using this.
Hardware Requirements:
Processor : 2.4 gigahertz (GHz)
RAM : 6 gigabyte (GB) (64- bit)
Hard disk space : 16 GB (64-bit)
Languages required : Python
Software Requirements: VS Code
This Project is done by using SMTP Protocol which is used send E-mail
over networks. With the help of SMTP protocol we send the keystrokes
as a message in mail by python.
15
CHAPTER 3
System Design
3.1 UML DIAGRAMS
16
3.3 Class Diagram
Class diagrams are the most common diagrams used in UML.
Class diagram consists of classes, interfaces, associations and
collaborations. Class diagrams are basically represent the object
oriented view of the system which is static in nature. Active class is
used in the class diagram to represent the concurrency of the system.
This is the most widely used diagram at the time of system construction.
as describes the class diagram.
17
CHAPTER 4
SYSTEM IMPLEMENTATION AND
TESTING
4.1 Screen Shots
Take 1:
Take 2:
18
Take 3:
Take 4:
19
Take 5:
Take 6:
20
Take 7:
21
4.2 TESTING
Since the error in the software can be injured at any stage. So, we
have carry out the testing process at different levels during the
development. The basic levels of testing are,
• Unit Testing
• Integration Testing
• Validation Testing
• Functional Testing
• Structural Testing
22
4.2.2 Integration Testing
This testing process focuses on identifying the interfaces between
components and their functionality. The bottom up approach was
adopted during this testing. Low-level modules are integrated and
combined as a cluster before testing. This allowed identifying any
wrong linkages or parameters passing early in the development process
as it just can be passed in the set of data and checked if the result
returned is an accepted one.
4.2.3 Validation Testing
23
4.2.5 Structural Testing
CHAPTER 5
CONCLUSION AND FUTURE
ENHANCEMENT
5.1 Results
24
in table 4.3 on page 48 and for Microsoft Windows 7 is summed
up in table 4.4.
5.2 Conclusion
A Windows Pc App on Keystroke analysis has been implemented
successfully, Which saves the keystrokes in a log file and sends it into
Email at regular intervals and whenever a key is pressed
5.3 References
Kirk P.H. Sullivan, Eva Lindgren, Computer keystroke logging and
writing : methods and applications
Behaviour Logging Tool, BeLT -verktøy for logging av
brukerinterasjoner, Gjøvik, May 2013.
Hafez Barghouthi, Keystroke Dynamics, How typing characteristics
differ from one application to another, 2009.
Cormac Herley and Dinei Florencio, How To Login From an Internet
Daniel J. Barrett, Richard E. Silverman and Robert G. Byrnes, SSH
The Secure Shell, The Definitive Guide, 2005
Nikolay Grebennikov, Securelist, Keyloggers: How they work and
how to detect them, 2007
25