Results 1 to 6 of 6

Thread: Is anyone here working on bypassing anti-shoplifting systems? Share/Save - My123World.Com!

  1. #1
    Garage Member
    Join Date
    Aug 2012
    Location
    India
    Posts
    97
    Blog Entries
    1

    Is anyone here working on bypassing anti-shoplifting systems?

    Hey all,
    Recently while I was visiting some malls and stores, the thought ran into my mind of what these towers like structures do?
    So I did some research and realised that these are Anti Shoplifting Systems. So I read some articles showing the working model of these. So the thought that came into my mind was, how to bypass them?
    So, I consulted 2 of the garage members and they told me that someone here's already working on it. So coming to the main point, is anyone working on the same?

    p.s - I've searched for finding any post/thread related to the above but of no use.

    Cheers,
    Thanks in advance.
    Anyone who stops learning is old, whether at twenty or eighty. Anyone who
    keeps learning stays young. The greatest thing in life is to keep your mind young.
    - Henry Ford

  2. #2
    Security Researcher fb1h2s's Avatar
    Join Date
    Jul 2010
    Location
    India
    Posts
    616
    Blog Entries
    32
    @41warior and @the_empty is working on those stuffs, there must be more people along with them but am unaware.
    Hacking Is a Matter of Time Knowledge and Patience

  3. #3
    Garage Addict 41.w4r10r's Avatar
    Join Date
    Jul 2010
    Location
    Pune
    Posts
    338
    Blog Entries
    3
    Hi RahulB,

    we did some research and it still going on.
    as of now we come across three possible bypass.

    for more discussion you can PM me or the_empty

  4. #4
    InfoSec Consultant the_empty's Avatar
    Join Date
    Jul 2010
    Location
    the blue no-where
    Posts
    155
    Blog Entries
    2
    Rahul,

    Thanks for putting a thread out here....

    As far as bypassing is concerned, you can just check the "shielding" section from the wiki link you posted. I have done this successfully couple of time (with proper permission from managers). As I can recall 8 wrappings of that "chapati" wrap foil did the trick for us when me and FB1 were getting our Tabs.

    That stuff is based on RFID so took our eyes. We are looking into more attack vectors such as SQL injections, DoS etc using RFIDs.

    Lets dig together if you find it interesting.

    the_empty
    P.S: Very busy so consider this trailer of the upcoming detailed post.
    ACCESS is GOD

  5. #5
    Garage Member
    Join Date
    Aug 2012
    Location
    India
    Posts
    97
    Blog Entries
    1
    hi the_empty and 41.w4r10r,
    Thanks for the prompt replies. Yeah I've read about the methods given their. And I tried to get permission from local stores. I too wanted to check the authenticity of that tin/aluminium bag (aka booster bag) trick but was denied..
    But the other ideas for e.g Jamming, DOS, SQLi, etc seem to be out of reach for me as I don't have much knowledge of this electronics/communication stuff..
    So I'd be grateful if you can suggest me some good books/places to start with (right from the Level 0).

    p.s - can't PM anyone as my post count < 15.

    cheers
    Thanks in advance.
    Anyone who stops learning is old, whether at twenty or eighty. Anyone who
    keeps learning stays young. The greatest thing in life is to keep your mind young.
    - Henry Ford

  6. #6
    InfoSec Consultant the_empty's Avatar
    Join Date
    Jul 2010
    Location
    the blue no-where
    Posts
    155
    Blog Entries
    2
    Check PM Rahul

    the_empty

    [for Completing the 30 characters limitation]
    ACCESS is GOD

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •