This paper is intended for educational purposes only.
We thought of creating a Keystroke logging, often referred to as keylogger or keyboard capturing software, that is a software that records the keystrokes of a keyboard without the users consent that the user of the keyboard is unaware that their information is being stolen or monitored. The information then can be sent to a remote person or account using email. Keyloggers are often used to steal confidential information such as passwords, but the aim of this project is just for the sake of knowledge and for the fulfilment of SEC235 project. And we are against any unethical use of this knowledge.
Table of Contents
1. Keystroke logging software (keylogger)
1.1 First Plan
1.2 Method of Creation
1.2.1 Keyboard strikes logger Python code
1.2.2 The File Deleting Python code
1.2.3 The Send email Python code
1.2.4 The Process killer Python code
1.2.5 The batch file
1.2.6 The VBS file
2. Properties
3. Effects on the Computer
4. Challenges and opportunities
Objectives and Topics
The primary objective of this project is to gain a deeper technical understanding of keystroke logging mechanisms by developing a functional, homemade keylogger within a controlled academic environment for the SEC235 course project.
- Implementation of keystroke capture using Python and the pynput module.
- Development of automated data exfiltration via email.
- Design of persistence and stealth mechanisms using batch and VBS scripting.
- Evaluation of system performance impact and detection evasion techniques.
Excerpt from the Book
Method of Creation
The keylogger has three files codded with python that do all the work and other two files, one batch file and another vbs file that will control the starting and closing of the keylogger files. The keylogger has a file of code that will capture all the keyboard strikes and store it in a .txt file, a file of code that will send the captured data file to an email, and a file that will delete the log file with all the captured data from the user’s computer so that the user will not know that he is being monitored. Moreover, we created another file of code that will kill running keylogger processes to attain efficiency, and for the email sending and file deleting codes to work without any obstacles.
Summary of Chapters
Keystroke logging software (keylogger): This chapter outlines the project intent, clarifying that it is purely for educational purposes and describing the fundamental approach to creating a custom keylogger on Windows 10.
Properties: This section details the stealth configuration of the software, specifically the use of .pyw files and startup folder integration to maintain background operation and evade initial antimalware detection.
Effects on the Computer: This chapter analyzes the impact of the software on system performance, noting a minor degradation in startup speed and the occurrence of transient command prompt flashes.
Challenges and opportunities: This chapter reflects on the development hurdles, including the time-intensive process of integrating disparate methods and the limitations encountered when antivirus software flagged the compiled executable files.
Keywords
Keylogger, Keystroke Logging, Python, pynput, Automation, Batch Scripting, VBS, Cybersecurity, Data Exfiltration, Windows 10, Antimalware, System Monitoring, Software Development, Scripting, Security Research
Frequently Asked Questions
What is the primary purpose of this project?
The project serves as an academic exercise for the SEC235 course to understand how keystroke logging software functions, emphasizing knowledge acquisition rather than unethical application.
What are the core components of the developed software?
The system comprises multiple Python scripts for logging, file deletion, email transmission, and process termination, orchestrated by batch and VBS files for automation and stealth.
What is the main research or development goal?
The goal was to build a functional, homemade keylogger capable of capturing keyboard input, exfiltrating the data via email, and maintaining persistence on a target Windows 10 system.
Which programming language was utilized for this implementation?
The entire implementation relies on Python, utilizing specific modules like 'pynput' and 'logging' to perform the core capture and communication tasks.
What does the main body of the work cover?
The documentation covers the technical breakdown of the individual script files, their specific functions, the methods used for stealthy execution, and an analysis of the software's interaction with the host operating system.
Which keywords best characterize this project?
The work is characterized by terms such as Keylogger, Python, Cybersecurity, Automation, and Data Exfiltration.
Why did the authors choose to use .pyw files for the scripts?
Using the .pyw extension prevents the opening of a black command prompt window when the scripts execute, which helps in keeping the monitoring activity hidden from the user.
What role does the VBS file play in the project?
The VBS script acts as a wrapper that hides the execution of the batch file, preventing the CMD screen from lingering on the desktop during the background operation of the logger.
Why did the team encounter issues with Symantec antivirus?
The antivirus software identified and deleted the compiled .exe versions of the python scripts as malicious, highlighting the difficulty of maintaining stealth against modern endpoint protection.
- Arbeit zitieren
- Henok Hayelom (Autor:in), 2018, Keystroke logging software. Keylogger Software, München, GRIN Verlag, https://www.grin.com/document/454010