Post on 03-Jun-2018
transcript
8/13/2019 Desktop Spying Project
1/24
DESKTOP SPYING
1. INTRODUCTION
This project mainly deals with controlling and monitoring the remote
system like capt!ring remote desktop image e"ec!ting application in remote
systems interacting with remote system Online teaching online de#!gging and
remote system sh!tdown in the network$ These acti%ities are %ital &or the
administrator to keep track o& %ario!s in&ormation a#o!t the !sers in the network
'()N*$
The administrator m!st know the IP address o& the system in the network to
make the application work$ In the ser%er application the remote client system+s IP
address is speci&ied in the address &ield and the connection is esta#lished #y
clicking the connect #!tton$
The administrator m!st know the IP address o& the systems in the network
to make the application work$ In the ser%er application the remote client system+s
IP address speci&ied in the address &ield and the connection is esta#lished #y
clicking the connect #!tton$
In an acti%e connection with client system the administrator can do the
&ollowing
,apt!re desktop image
-emote application e"ec!tion
Import and e"port &iles
-emote system (ock
Page . o& /0
8/13/2019 Desktop Spying Project
2/24
DESKTOP SPYING
1.1ABOUT THE PROJECT
The so&tware package is designed to monitor the acti%ities o& any comp!ter
system in a local area network$ In a local area network any system can #e
con&ig!red as a ser%er or administrator system and thro!gh this administrator
system one can %iew the acti%e image which is displayed on the monitor o& any
system in the network !pon re1!est &rom the administrator$ The administrator
&rom his system can %iew these capt!red images and may record2store &or &!t!re
!se$ The so&tware is e1!ipped with %ario!s other !tilities like online teaching
remote application e"ec!tion$ 3ith this kind o& &eat!res the so&tware will play a
good roll in some ed!cational instit!tes comp!ter la# and on any pri%ate local
area network$
This application r!ns in a local network #asically the application connects
to the remote client system !sing the IP address$ The administrator m!st know the
IP address o& the systems in the network to make the application work$ In the
ser%er application the remote client system+s IP address speci&ied in the address
&ield and the connection is esta#lished #y clicking the connect #!tton$ Once the
connection with the client is esta#lished the administrator can do %ario!s tasks$
The de%elopment is categori4ed into two major types as
Ser%er
client
Server Version
In this %ersion all the system in the local area network which is connected is
display along with their connection stat!s$ Pro%ision to connect to any client
system is made !sing the IP address$ )t any time any client can #e connect or
disconnected$
Page / o& /0
8/13/2019 Desktop Spying Project
3/24
DESKTOP SPYING
In an acti%e connection with client system the administrator can do the
&ollowing
,apt!re desktop image
-emote application e"ec!tion
Import and e"port &iles
-emote system (ock
Client version
In this %ersion o& so&tware the !ser in the client side cannot know the client
%ersion so&tware r!nning in the system$ Once the connection will #e esta#lished
the client system will #e locked$
MODULES
Desktop capt!ring
-emote application e"ec!tion
-emote system (ock
5onitor and control the remote comp!ter
Import and E"port -DP &iles$
Deskto C!t"rin#
The desktop image capt!ring mod!le capt!res a remote system desktop
!pon re1!est &rom the ser%er2administrator$ 3ith the command &rom the ser%er the
client capt!res the desktop images #y generating a print screen e%ent$ 3hen the
key press e%ent is triggered the system capt!res the c!rrently displayed
in&ormation in the monitor and places it in the clip#oard memory o& the client
system$ Once the connection will #e esta#lished the ser%er can do all the acti%ities
Page 6 o& /0
8/13/2019 Desktop Spying Project
4/24
DESKTOP SPYING
in the client screen thro!gh the ser%er system$ They need not go the client system
&or any acti%ities$
The ne"t e%ent is to con%ert the image in the clip#oard memory into a7$8mp9 &ile &ormat$ The con%erted #it map image is sa%ed in a speci&ied path$
)&ter the capt!ring and con%ersion o& the image the &ile is trans&erred to the ser%er
system and then the &ile is displayed$
Re$ote Ali%!tion E&e%"tion
This mod!le in the serer will display all the application which can #e
e"ec!ted in the client system$ 8!t this in&ormation can #e &etched only when the
connection #etween the ser%er and the client is esta#lished$ The application along
with the path in the client system is displayed and a corresponding command
#!tton is displayed$ So the !sers or the administrator can press the command
#!tton to r!n the corresponding application in the client system$ The so&tware is
designed to ha%e three applications$
Re$ote s'ste$ Lo%k
3ith this mod!le the administrator can connect to the client and check i&
the system is #eing !sed #y nay !ser this can done #y capt!ring the desktop image
o& the client system$ Once i& the system is &o!nd to #e idle and not !sed #y any
!sers then the administrator can lock the remote system &rom his system$ The
system lock process is achie%ed #y calling a windows application programmers
inter&ace &!nction$
Page 0 o& /0
8/13/2019 Desktop Spying Project
5/24
DESKTOP SPYING
1.( S)STEM CON*I+URATION
ABOUT THE HARD,ARE
Processor : Intel Penti!m I; Processor
Speed : .$< G=4
-)5 : / G8
=ard disk : >? G8
,D -O5 Dri%e :
8/13/2019 Desktop Spying Project
6/24
DESKTOP SPYING
1.-SO*T,ARE *EATURES
I$ort!nt *e!t"res
The application is graphical !se inter&ace$
E%ent dri%en programming lang!age where all the acti%ities are
triggered #y one e%ent or the other$
!ick de%elopment o& o#ject #ased window data#ase application
with little coding$
8!ilt in data#ase s!pport$
,lient ser%er architect!re #ene&its$
Pro%ides simple de#!gging tools$
St!tes o !li%!tion
This application can #e %iewed in three distinct states:
.$ Design
/$ E"ec!tion
6$ 8reak
In design state we can edit !ser inter&ace or add code to the application$ In
e"ec!tion state the application is r!nning and only a &ew men! commands are
a%aila#le$ In #reak state the application is halted$
It can #e #est !nderstood #y comparing it with proced!ral programming$ it
m!st #e &irst decided how the application sho!ld interact with the !ser$ In other
words we ha%e to decided how each control reacts to !ser actions s!ch as the
click o& a mo!se keystrokes and these reactions m!st #e programmed$ )s the
e%ent ca!sed #y the !ser determines the &low o& applications$
Page F o& /0
8/13/2019 Desktop Spying Project
7/24
DESKTOP SPYING
UNDERSTANDIN+ THE PRO+RAM MODEL
In tradition or 7proced!ral9 application itsel& controls which portions o&
code e"ec!te and in what se1!ence$ E"ec!tion starts with the &irst line o& code and&ollows a prede&ined path thro!gh the application calling proced!re as needed$
The code doesn+t &ollow a predetermined pathCit e"ec!tes di&&erent code
sections in response to e%ents$ E%ents can #e triggered #y the !ser+s actions #y
message &rom the system or other applications or e%en &rom the applications itsel&$
The se1!ence o& these e%ent determine the se1!ence in which the code e"ec!tes
th!s the path thro!gh the application+s code di&&ers each time the program r!ns$
The code can also trigger e%ent d!ring e"ec!tion$ Bor e"ample
programmatically changing the te"t in the te"t#o" ca!se the te"t #o"+s change
e%ent to occ!r$ This wo!ld ca!se the code 'i& any* contained in the change e%ent to
e"ec!te$ I& yo! ass!med that this e%ent wo!ld only #e triggered #y !ser
interaction we might see !ne"pected res!lts$ It is &or this reason that it is
important to !nderstand the e%entCdri%en model and keep it in mind when
designing o!r application$
Inte#r!te/ Develo$ent Environ$ent
)pplications are de%eloped in the integrated de%elopment en%ironment'IDE*
Co$onents !re0
5en! #ar
Tool#o" windows display the controls
Borm windows display the &orm that holds the controls and
which is !se&!l &or de%eloping the !ser inter&ace$
Page @ o& /0
8/13/2019 Desktop Spying Project
8/24
DESKTOP SPYING
Properties 3indows has list o& all the properties &or a control$
Project E"plorer 3indow has list p& all the &orms ad mod!les$
Standard tool#ar displays the &re1!ently !sed commands in
the &orm o& mod!les$
,ode editor window where code is written$
Borm (ayo!t 3indow allows to %is!ally position the &orm at
design time$
,onte"t 5en! a shortc!t men! with &re1!ently per&ormed
actions$
It can #e displayed #y right clicking on the o#ject$ Immediate locals and
watch windows these additional windows are pro%ided &or !se in de#!gging
yo!r application$ They are only a a%aila#le when yo! are r!nning yo!r
application within the IDE$
,' to /evelo tis !li%!tion0
Yo! don+t need to #e an e"pert !ser o& 5icroso&t 3indows
)pplication can #e de%eloped &aster$
It also !sed &or de%eloping prototypes$
Programming #!gs don+t happen as o&tenCand i& they do they
are lot easier to detect and &i"$
3e don+t ha%e to pay m!ch o& per&ormance penalty$
Page > o& /0
8/13/2019 Desktop Spying Project
9/24
DESKTOP SPYING
,INSOC2
Name commonly !sed &or the windows Sockets programming inter&ace
!sed to pro%ide a protocolCindependent transport inter&ace$ 3indows ,E s!pports
most o& the common 3insock &!nctions$
Page o& /0
8/13/2019 Desktop Spying Project
10/24
DESKTOP SPYING
(.S)STEM STUD)
(.1 PROPOSED S)STEM
This project designed not only in the aim o& remo%ing the internet and sa%e
time$ The main o#jecti%e is &or #etter work to take place$
This application is mostly !sed in colleges schools and organi4ations$ In
case o& schools and colleges the master can help and clear the st!dent+s do!#ts in
online$ I& any o& the st!dents mis!se the system the master can remotely lock the
system$ In case o& organi4ation the manager can monitor the sta&& systems and
comm!nicate with sta&& &or get some in&ormation &rom the sta&&+s system$
The manager monitors the sta&& per&ormance and process stat!s o& the
sta&&+s works$ Online co!nseling is achie%ed$ The commands can #e e"ec!ted to
lock the remote system$
In the same way we can e"ec!te other commands remotely like in internet
#rowsing centers they can monitor the systems and re1!est the !sers to a%oid
#rowsing restricted wed sites$ I& any system is an idle then those systems can #e
remotely locked$
The proposed 7DesktopCspying9 has #een de%eloped with $NET as a &ront
end$ This system has #een designed to cater the need o& an organi4ation
ed!cational instit!te etc
Page .? o& /0
8/13/2019 Desktop Spying Project
11/24
DESKTOP SPYING
A/v!nt!#es o roose/ s'ste$0
The proposed system has many ad%antages o%er the e"isting man!al
system$ Some o& them are as &ollows$
It is %ery !ser &riendly$
It interacts with !ser to get in&ormation and to trans&er the
in&ormation$
Since it looks like a windows program$ It does not need any
special training$
It is &ast and e&&icient$ It sa%es times and energy to store
trans&ers the in&ormation &rom one system to another system$
-emote desktop spying
-emote system lock
5onitor and control the remote application
Import and e"port -DP &iles
Pre%ents illegal !se o& comp!ters in (a#2Ed!cational
8roadcast any instance 5essages2Instr!ctions
-emote application e"ec!tion'application r!ns on any
selected system thro!gh the network*
-emote lock on the local area network$
)ccording to the a#o%e points this system is easy to handle and interact with
mod!les and records$
Page .. o& /0
8/13/2019 Desktop Spying Project
12/24
DESKTOP SPYING
-. S)STEM ANAL)SIS
-.1 S)STEM *LO, DIA+RAM
System &low diagram descri#es the data &low &or a data processing system$
It pro%ides a logical diagram o& how the system operates$ It represents the &low o&
doc!ments the operations per&ormed in data processing system$ It also re&lects the
relationship #etween inp!ts processing and o!tp!ts$
Bollowing are the &eat!res o& system &low diagram:
The so!rces &rom which data is generated and de%ice !sed &or
this p!rpose$
;ario!s processing steps in%ol%ed$
The intermediate and &inal o!tp!t prepared and the de%ices
!sed &or their storage$
Page ./ o& /0
8/13/2019 Desktop Spying Project
13/24
DESKTOP SPYING
-etrying
Searching with IP )ddress
Is not a%aila#le
Is a%aila#le -etrie%ing (ink
Page .6 o& /0
Hser
Searching &or the
()N connection
Searching in ()N
,lient Hser
Error -eport
8/13/2019 Desktop Spying Project
14/24
DESKTOP SPYING
-.( DATA *LO, DIA+RAM
Page .0 o& /0
8/13/2019 Desktop Spying Project
15/24
DESKTOP SPYING
Page .< o& /0
=ost Name
,hat data
IP )dd ,ommand
IP )dd ,ommandIP )dd ,ommand
(ock )pplication 3indow B!nction
)ppl Path$
Name
IP )dd ,ommand-emote )pp No
Bile Name$8mp
,apt!reBile
IP )dd ,apt!ringSystem
IP )dd =ost Name
DCspy
Image ,apt!re
screene%enttrigger
,on%ert
clip#oarddata into
#mp
System ,on&ig!ration
-emote (ock
5onitor andcontrol the remote
system
3in Socket -emote )pplication
E"ec!tion
Store
Bile
E"e Shell ,omm
Stor
Path
,on&ig -emote )ppl
E"e -emote )ppImport and E"port -DP
&ilese"
8/13/2019 Desktop Spying Project
16/24
DESKTOP SPYING
3. S)STEM DESI+N AND DEVELPOMENT
3.1 INPUT *ORM DESI+N
Inacc!rate inp!t data are the most common ca!se o& errors in data
processing$ Error &o!nd at the data entry can #e controlled #y proper inp!t design$
The inp!t %alidations are per&ormed are &ield le%el$ The &ollowing are some
constraints !sed in inp!t design:
Speci&ying ma"im!m length &or each &ield$
Speci&ying &ormat &or the date &ield$
(isting the domain name &or connection$
Te in"t is /esi#ne/ 4it te ollo4in# o56e%tives
.$ To get the highest le%el o& acc!racy$
/$ To ens!re that the inp!t is accepta#le and !nderstanda#le #y
the people who are !sing it$
6$ To prod!ce an e&&ecti%e method$
Desi#ne/ te Pro6e%t !%%or/in# to Sot4!re En#ineerin# Prin%iles
Birst phase o& any So&tware Project design is to o#tain the -e1!irements
&rom the client$
,lient has gi%en the task o& capt!ring desktop remote lock remote
system #asically the desktop spying will capt!re desktop images o& a
remote system ha%e the complete in&ormation stored in the ser%er$
Page .F o& /0
8/13/2019 Desktop Spying Project
17/24
DESKTOP SPYING
The second phase o& the project design is Speci&ications$
The so&tware package will prompt the !ser to enter certain
in&ormation to make the project work in the re1!irements phase$
The third and important phase is design$ 3e ha%e &!rther di%ided the design
process into two phase+s %i4$ )rchitect!ral Design and Detailed Design$
In the architect!ral design the project as a whole is #roken down into
components called mod!les$
Detailed design o& each and e%ery screen will #e decided as the project
progress$
Page .@ o& /0
8/13/2019 Desktop Spying Project
18/24
DESKTOP SPYING
3.(OUTPUT DESI+N
The design &ollowing windows are designed
.$ ) main window with all mod!les links and &or all acti%ities is
done$
/$ The re1!ire in&ormation &or this system is o#tained thro!gh
!ser interaction with design &orm$
6$ The o!tp!t is designed and &ramed$
The &inal o!tp!t is designed$ The o#jecti%e o& any in&ormation system is
generation o& the &orms$ The o!tp!t pro%ides direct transactions o& in&ormation to
the systems !sers and so it is the most in the design phase$
The o!tp!t design sho!ld #e well &ramed and it contains all the re1!ired
in&ormation and sho!ld #e well &ormatted a%oiding comple"ity in transact
in&ormation &rom the inp!t$ So a lot o& acre has #een while designing the o!tp!t$
The o!tp!t design sho!ld contain all the !ser re1!irements speci&ied in the st!dyphase$
Page .> o& /0
8/13/2019 Desktop Spying Project
19/24
DESKTOP SPYING
7. S)STEM TESTIN+ AND IMPLEMENTAION
S)STEM TESTIN+
System testing is the stage o& implementation which is aimed at ens!ring
that the system works acc!rately and e&&iciently$ The system test in implement is a
con&irmation that all is correct and an opport!nity to show the !sers that the
system woks correctly$
Each mod!le in the system is tested indi%id!ally and these mod!les are p!t
together to &orm a s!#system$ The system is also tested and then the s!#system is
integrated to &orm the complete system !sing test data the whole system is tested
in order to %eri&y that programs link together in the way speci&ied to prod!ce the
o!tp!ts speci&ied$ The complete systems are tested to the satis&action o& !ser$
The methodology !sed &or testing the system is topCdown approach$ In this
method the test data is &ed to the system and the o!tp!t o#tained res!lts &or
%eri&ication are tested$
UNIT TESTIN+
Hnit testing &oc!sed on %eri&ication e&&orts on the smallest !nit o& so&tware
design the mod!le$ This is also known as 75od!le Testing9$ The mod!les are
tested separately$ This testing is carried o!t d!ring programming stage itsel&$ In
these steps each mod!le is &o!nd to #e working satis&actorily as regard to the
e"pected o!tp!t &rom the mod!le$
Page . o& /0
8/13/2019 Desktop Spying Project
20/24
DESKTOP SPYING
Tere !re o"r t'es o test eror$e/ on $o/"le or ! ro#r!$ "nit$
*UNCTIONAL TEST
The in%ol%es e"ercising the code with nominal inp!t %al!es &or which thee"pected res!lt are known as these tests well as #o!ndary %al!es and other special
%al!es$
PER*ORMANCE TEST
These tests determine the amo!nt o& e"ec!tion time spent in %ario!s parts
o& the program !nit program thro!gho!t response time and de%ice !tili4ation #y
the program !nit$
STRESS TEST
These tests are designed to intentionally #reak the !nit$ These tests are
re&erred to as 7#lackC#o"9 testing$
STRUCTURE TEST
These tests are concerned with e"ercising the internal program and
tra%ersing partic!lar e"ec!tion paths$ It is re&erred as 7whiteC#o"9 testing$
IMPLEMENTATION
) primary goal o&& so&tware implementation is prod!ction o& so!rce code
that is easy to read and !nderstand$ ,larity o& so!rce code eases de#!gging testing
and modi&ication and these acti%ities cons!me a large portion o& most so&tware#!dgets$ The goal can #e achie%ed #y making the so!rce code as clear and
straight&orward as possi#le$
Page /? o& /0
8/13/2019 Desktop Spying Project
21/24
DESKTOP SPYING
VERI*ICATION
;eri&ication is a &!ndamental concept in so&tware design$ Hnit testing
&oc!ses %eri&ication e&&ort on the smallest !nit o& so&tware design the &ield$ This
testing was carried o!t d!ring programming stage itsel&$ In the testing step each
mod!le is &o!nd #e working satis&actory as regards the e"pected o!tp!t &rom the
mod!le$ ) design is %eri&ia#le i& it can #e demonstrated that the design will res!lt
in an implementation tat satis&ies the !ser+s re1!irements$
VALIDATION
) %alidation re%iew is an e%al!ation o& a system in terms o& the e"tent to
which the system accomplishes stated o#jecti%es and act!al project costs e"ceed
initial estimates$ It is !s!ally a re%iew o& major pro#lems that need con%erting and
those that s!r&aced d!ring the implementation phase$ The %alidation st!dy #egins
with re%iew team which gathers and re%iews &or e%al!ation$
Hne"pected change in the system that a&&ects the !ser or system
per&ormance is a primary &actor that prompts system re%iew$ Once re1!est is &ield
the !ser is asked how well the system is &!nctioning to speci&ications or how well
the meas!red #ene&its #een reali4ed$
Page /. o& /0
8/13/2019 Desktop Spying Project
22/24
DESKTOP SPYING
8. SCOPE *OR *URTHER DEVELOPMENT
The 7DesktopCspying system9 pro%ides the !ser with total o%erall control o&
the application$
Since it is de%eloped in $NET it #ecomes a we#C#ased application and
m!ltiple !sers can access &rom m!ltiple sites$ The 7DesktopCspying system9
pro%ides easily administrator work can see and g!ide to !nknown others within in
the system itsel&$
The 7DesktopCspying system9 pro%ides to trans&er data &rom one into many
systems with the help o& (ocal )rea Network$ )nd also in &!t!re make a
administrator work thro!gh the internet$
Page // o& /0
8/13/2019 Desktop Spying Project
23/24
DESKTOP SPYING
9. CONCLUSION
The project ga%e me a good e"perience to create my own so&tware$ This
project helped me to know new thing in $NET$
In today+s world monitoring the network is a m!st &or a system
administrator$ Hsing the system admin can a%oid !sers mis!sing the system$
Nowadays h!man want e%erything to #e done at the desk$ )nd so this project is
not an e"ception$ 3ith this the !sed is more #ene&ited and hard task are simple$
In the de%elopment o& the project I was a#le to learn a lot in di&&erent areas
like networking handling key#oard e%ents !sing windows )PI call &!nctions
!sing win socket controls and learned a lot a#o!t the display system in a comp!ter$
Page /6 o& /0
8/13/2019 Desktop Spying Project
24/24
DESKTOP SPYING
:. BIBLIO+RAPH)
,,,.. NETRE*ERENCE.COM
,,,..NET SCRIPT.COM
;+UIDE TO .NET