Sie sind auf Seite 1von 24

SUBMITTED TO:

Ms.DIVYA K V
Ms.VIDYA M
Ms.JUCY VAREED




SUBMITTED BY:
SAVITHA K J
LAKSHMI RAJ
JASEENA ABUBACKER
ANJANA DEVARAJ
SHABINA P S

1. AIM
2. REQUIREMENT ANALYSIS
SOFTWARE REQUIREMENTS
HARDWARE REQUIREMENTS
FUNCTIONAL REQUIREMENTS
3. ARCHITECTURE OF THE SYSTEM
4. PROPOSED SYSTEM
5. TESTING
6. TESTING STRATEGIES
7. PERFORMANCE AND EVALUATION STRATEGIES
8. CONCLUSION
9. REFERENCE

To build a hacking system which uses image
stegnography
System Type: IBM compatible PC with 1GHz
RAM: 512MB
Cache: 512KB
Storage: 120GB

Operating System: Windows 2000 Server/
Windows XP/Windows 7
Language Used:JDK-7
Softwaresused:Netbeans IDE 7.3
DATABASE: MYSQL
FUD Binder

Image selection: careful selection of the
Image so as to maintain it as original as
possible.
Image bit extraction: extraction of the bit
representation of the selected image.
Binding: binding program in the selected image
Image exchange via e-mail: Sending the
processed image to victim via e-mail

LOGIN
TO
SELECT
IMAGE
IMAGE
PROCESSING
IMAGE
BINDING
HACKING
KEYLOG
RECORDS
INPUT
BLURRED
IMAGE
E
-
M
A
I
L

OUTPUT
INSIDE SOFTWARE
LOGOUT
STORE
IMAGE
THERE ARE 3 MODULES IN THIS SYSTEM
NAMELY:

IMAGE PROCESSING
IMAGE BINDING
HACKING

TOGETHER IN A
SOFTWARE
IMAGE
MANIPULATION
IS THERE
ANY
WHITE
SPACE
CONVERT
TO BITS
BLURRED
IMAGE
DELETION OF
WHITE SPACE
IMAGE
SELECTION

Image manipulation consists of 3 options
Resize
Image cropping
Image autofilling
Manipulation of the image is done to create
adequate space to bind the keylogger.
STEPS:
o Select an image with considerable white space
in it and manipulate the image
o Covert the image into bit representation
o Delete the white space bits
o We get the blurred image
SELECT KEYLOGGER
ATTACH FUD
BINDER
INSERT TO
AVAILABLE BIT
SPACE
STEGO OBJECT
ENCRYPT
STEPS:

o Select the keylogger software that is to be
binded with the image
o Insert it to the available bit space of the
processed image along with FUD binder
o Finally we get the stego image object
o Store the stego object and attach it to send.


STEGO
OBJECT
RECEIVER
KEYLOGGER
ACTIVATION
KEYLOG
SENT TO
OPENS IMAGE
S
T
A
R
T
S

R
E
C
O
R
D
I
N
G

HACKER
RECEIVES
DATABASE
OF LOGS

SYSTEM OF
HACKER ACTS AS
A CHILD OF THE
HACKED SYSTEM
SYSTEM OF THE
VICTIM ACTS AS
THE PARENT OF
THE HACKER
SYSTEM
RECORD
OF THE
KEYS
PRESSE
D BY
THE
PARENT
KEYLOGS STORED IN DATABASE
STEPS:
o stego object is sent to the victim
o the victim opens it and the
keylogger is activated
o the victim ,unknown about the activation,
continues the work
o hacker gets the keylogs of victim

The proposed system is hacking system which
uses image binding. It aims to produce a passive
attack. It doesn't crash the system or it doesn't
cause any harm or modification to the data
present in the system. We are proposing a
technique of binding a keylogger to an image
using image steganography.
Once a computer user has been infected
with a Keylogger, it will continue to run in a
hidden manner, and report all the information
that is being input into the computer, and this is
sent back to the hacker or some other hidden
third party. After the hacker has compiled
enough information using the Keylogger,
keylogger sends the all key strokes of the
master system

SpyShelter Security Test Tool (AntiTest.exe): An easy way
to test anti-keyloggers and similar privacy applications.

AKLT(Anti-Keylogger Tester): is a free portable tool for
Windows that tests whether the anti-keylogger tools
installed in your computer actually works.

Key-Logger Simulation Test Program: This test program
simulates the activities of a keylogger. If your security
software is protecting you proactively, then the
simulation should trigger a warning message.



FEASIBILITY ASPECTS ANALYSED ASPECT
ECONOMIC BENEFITS HIGH RETURNS
OPERATIONAL SECURITY HARDLY SECURE
CONTROL DIFFICULT TO
CONTROL
SERVICES EXTENSIVELY RELIABLE
TECHNICAL COMPATIBILITY DEPENDS ON SYSTEM
SERVICES
PORTABILITY MACHINE
INDEPENDENT
Our objective was to build an authenticated
software which processes a selected image
and binds a keylogger with it. Later the stored
image is to be sent to the victim.

The work is successfully started and we hope to
expand the work further to achieve best
results.
REFERENCE PAPERS:
Data hiding in audio signal, video signal,text and jpeg images
Keyloggers:Increasing Threats to Computer Security and Privacy
Reversible Data Hiding in Encrypted Image
Unprivileged Black-Box Detection of User-Space Keyloggers
On the Limits of Steganography
Detecting LSB Steganography in Color and Gray
Hide and Seek: An Introduction to Steganography
Hiding Text behind Image for Secure Communication

IEEE-International Conference On Advances In Engineering, Science And
Management (ICAESM2012) March 30, 31, 2012






REFERENCE SITES:


http://williamstallings.com/Cryptography/

http://williamstallings.com/Crypto/Crypto4e.html

http://www.securelist.com/en/analysis?pubid=204791931

http://pro-hac.blogspot.in/2010/04/what-is-fud-crypter-hide-trojans.html

http://www.combofix.org/what-is-a-keylogger-virus-and-how-to-remove-it.php

http://www.hackersthirst.com/2011/03/hiding-ratstrojans-and-keyloggers-from.html

http://www.101hacker.com/2011/03/crypter-software-to-bypass-antivirus.html

http://hackclarify.blogspot.in/2012/05/hiding-keyloggersratswormsviruses-using.html

http://k1ng420.blogspot.in/2013/06/binders-and-crypters.html

http://hack-o-crack.blogspot.in/2011/01/hide-keyloggers-and-trojans-with.html

Das könnte Ihnen auch gefallen