Founder and CEO at C1PH3R-FSocitey.
Speaker
Founder and CEO at C1PH3R-FSocitey
Rahul Thareja is the Founder and Hardware Security Researcher at C1ph3r-Fsociety, where he develops offensive security hardware focused on RF, BLE, Wi-Fi, and embedded system attack surfaces. With a background in robotics engineering and embedded systems, his work centers on building practical hardware tools that help researchers explore wireless vulnerabilities and understand real-world attack scenarios.
His research interests include wireless protocol behavior, RF signal interaction, BLE communication analysis, and hardware-assisted security testing in IoT ecosystems. By combining embedded engineering with practical security experimentation, Rahul aims to bridge the gap between theoretical security discussions and hands-on technical exploration.
He actively contributes to the security community by organizing hands-on hardware hacking villages where attendees can interact with custom-built devices demonstrating wireless security concepts. Rahul has also hosted soldering villages that introduce participants to basic electronics assembly and hardware hacking, helping make the hardware side of cybersecurity more accessible to the community.
Through these initiatives, Rahul aims to encourage more people to explore hardware hacking and embedded security research. His goal is to make offensive hardware research more accessible, practical, and engaging for the broader cybersecurity community.
Modern devices constantly communicate over wireless protocols such as RF, Bluetooth Low Energy (BLE), and Wi-Fi, yet many of these technologies are poorly understood from a security perspective. This hands-on hardware provides an interactive environment where attendees can explore how wireless systems behave under real-world attack scenarios using purpose-built security research hardware.
This showcase a collection of compact embedded devices designed to demonstrate practical wireless security concepts, including RF signal replay, BLE interaction behavior, Wi-Fi management frame awareness, and USB HID-based automation risks. These tools are built using widely accessible microcontrollers and radio modules, illustrating how low-cost hardware can be used to study wireless protocols and identify security weaknesses.
Rather than a traditional presentation, this operates as an open lab where attendees can walk in at any time, observe demonstrations, inspect hardware, and discuss the engineering behind the tools. Participants will learn how embedded platforms such as ESP32-based systems and RF transceivers can be adapted for security experimentation and how attackers and defenders both benefit from understanding protocol-level behavior.
Throughout the day, live demonstrations will show how wireless devices react to different types of interactions in a controlled environment, accompanied by discussions on detection techniques and defensive strategies.
This activity is suitable for beginners interested in hardware hacking as well as experienced practitioners looking to explore practical wireless security research tools. Attendees will leave with a deeper understanding of wireless attack surfaces, embedded hardware experimentation, and how hardware-assisted security research can help uncover vulnerabilities in modern connected devices.