This paper is intended for educational purposes only.
We thought of creating a Keystroke logging, often referred to as keylogger or keyboard capturing software, that is a software that records the keystrokes of a keyboard without the users consent that the user of the keyboard is unaware that their information is being stolen or monitored. The information then can be sent to a remote person or account using email. Keyloggers are often used to steal confidential information such as passwords, but the aim of this project is just for the sake of knowledge and for the fulfilment of SEC235 project. And we are against any unethical use of this knowledge.
Table of Contents
- First Plan
- Method of Creation
- Keyboard strikes logger Python code
- The File Deleting Python code
- The Send email Python code
- The Process killer Python code
- The batch file
- The VBS file
Objectives and Key Themes
The objective of this project was to create a keystroke logging software (keylogger) for educational purposes, demonstrating the creation and functionality of such a program. The project aimed to fulfill the requirements of a SEC235 project and is not intended for any unethical use.
- Keylogger Development and Functionality
- Python Programming for Keylogging
- Data Handling and Security (Data Deletion and Email Transfer)
- Process Management (Killing Running Processes)
- Ethical Considerations of Keyloggers
Chapter Summaries
First Plan: This section outlines the initial concept of the project – to build a keylogger that records keystrokes without user consent and sends the data via email. The team acknowledged the potential for misuse and emphasized their intention to use the project solely for educational purposes and compliance with the SEC235 project requirements. They also researched existing keyloggers and noted that Windows 10 has a built-in keylogger, but their project would require physical access to the target computer for initial setup. The choice to use Python on a Windows system was made for ease of coding and a temporary email address was chosen to receive logs.
Method of Creation: This chapter details the technical implementation of the keylogger. The system comprises three core Python files: one to log keystrokes, one to send the data via email, and one to delete the log file. Additional batch and VBS files are utilized to control and automate the execution and concealment of the keylogger. The Python scripts utilize various modules to achieve the keylogging, email functionality, and file deletion. The batch file orchestrates the sequence of execution, using timeouts to allow each process to complete before launching the next. The VBScript is included to mask the execution from the user through hiding the command prompt. The description of each component (logging, deleting, email sending, process killing) in this section provides technical details on their operation and interaction.
Keywords
Keylogger, Python, keystroke logging, data security, email, process management, batch file, VBScript, ethical considerations, SEC235 project, data deletion, temporary email.
SEC235 Keylogger Project: Frequently Asked Questions
What is the purpose of this project?
This project aims to create a keystroke logging software (keylogger) for educational purposes, demonstrating the creation and functionality of such a program. It fulfills the requirements of a SEC235 project and is explicitly stated to not be intended for any unethical use.
What are the key components of the keylogger?
The keylogger consists of several core components: Python scripts for keystroke logging, email sending, and file deletion; a batch file to orchestrate the execution sequence; and a VBScript to mask the execution from the user. These components work together to record keystrokes, send the data via email, and delete the log file.
What programming language was used?
The project primarily uses Python for its core functionality (keylogging, email sending, file deletion). Additionally, batch files and VBScript are used for process control and concealment.
How does the keylogger function?
The Python scripts utilize various modules to achieve their respective tasks. The batch file coordinates the execution of these scripts with timeouts to ensure proper sequencing. The VBScript hides the command prompt, obscuring the keylogger's activity from the user.
What are the ethical considerations discussed in the project?
The project explicitly addresses the ethical implications of keyloggers, highlighting the potential for misuse and emphasizing that the project is solely for educational purposes and adheres to the SEC235 project requirements. The use of a temporary email address is also mentioned.
What are the chapter summaries?
The "First Plan" chapter outlines the initial concept and design of the keylogger, emphasizing its educational purpose and noting existing keylogging technologies. The "Method of Creation" chapter details the technical implementation, explaining each component's function and interaction.
What are the main objectives and themes?
The main objectives focus on keylogger development, Python programming for keylogging, data handling and security (including data deletion and email transfer), process management (killing running processes), and the ethical considerations surrounding keyloggers.
What keywords are associated with this project?
Key keywords include: Keylogger, Python, keystroke logging, data security, email, process management, batch file, VBScript, ethical considerations, SEC235 project, data deletion, temporary email.
What is the initial plan described in the document?
The initial plan was to create a keylogger that records keystrokes without user consent and sends the data via email. The team acknowledged the potential misuse and emphasized their intention for educational use only, complying with SEC235 project requirements. They considered the use of Python on Windows for ease of development and a temporary email address for log reception.
What methods were used for creation?
The creation involved three main Python scripts: one for keystroke logging, one for sending data via email, and one for deleting log files. Supporting batch and VBS files managed execution and concealment. Specific details on each script's functionality are provided.
- Quote paper
- Henok Hayelom (Author), 2018, Keystroke logging software. Keylogger Software, Munich, GRIN Verlag, https://www.grin.com/document/454010