Keylogger With Log File Encryption / Lim Sheng Li

By: Lim Sheng LiMaterial type: TextTextPublication details: 2018Dissertation note: Project paper (Bachelor of Computer Science ) - University Malaysia of Computer Science and Engineering, 2018. Summary: Keylogger tools is used to record all keystrokes on a computer with the tool installed on it, and in the world of cyber-crime, keylogger tool has been used mostly for malicious purpose such as stealing Personally Identifiable Information (PII), credit card number, Card Security Code (CSC), and etc. However, if used ethically (with prior consent from the user of the computer), keylogger can be useful in terms of monitoring user’s activities without being noticed. For instance, parents monitor their child’s searches on the web. With that said, log file is required to store recorded keystrokes, and one of the key weakness of keylogger tool is that log files aren’t encrypted, which alert the user once he or she has discovered the log files and read its contents. Hence, this project will be solely focusing on developing a prototype keylogger (specifically an API-based keylogger) with log file encryption to avoid the aforementioned issue. Besides that, the prototype keylogger will captured clipboard data, screen, and active window's title as well for a more comprehensive information regarding the current running application and copied data. Before that, a study and comparison on existing API-based keylogger tools will be performed, and the result will be used as a reference for the functionality of the prototype keylogger and to develop a conceptual model for the prototype keylogger.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)

Abstract in English

"A report project submitted in partial fulfillment of the requirements for the award of Bachelor of Computer Science (Hons)." -- On t. p.

Project paper (Bachelor of Computer Science ) - University Malaysia of Computer Science and Engineering, 2018.

Keylogger tools is used to record all keystrokes on a computer with the tool installed on it, and in the world of cyber-crime, keylogger tool has been used mostly for malicious purpose such as stealing Personally Identifiable Information (PII), credit card number, Card Security Code (CSC), and etc. However, if used ethically (with prior consent from the user of the computer), keylogger can be useful in terms of monitoring user’s activities without being noticed. For instance, parents monitor their child’s searches on the web. With that said, log file is required to store recorded keystrokes, and one of the key weakness of keylogger tool is that log files aren’t encrypted, which alert the user once he or she has discovered the log files and read its contents. Hence, this project will be solely focusing on developing a prototype keylogger (specifically an API-based keylogger) with log file encryption to avoid the aforementioned issue. Besides that, the prototype keylogger will captured clipboard data, screen, and active window's title as well for a more comprehensive information regarding the current running application and copied data. Before that, a study and comparison on existing API-based keylogger tools will be performed, and the result will be used as a reference for the functionality of the prototype keylogger and to develop a conceptual model for the prototype keylogger.

There are no comments on this title.

to post a comment.