Blogs
Your Network is Not a Black Box by Gerald Combs
12 Ways to Go Deep with Wireshark at SharkFest 2013 by Dormain Drewitz
Wireshark at 15: How to Start a Project That Lasts by Liz Padula
Wireshark Tips and Tricks Used by Insiders and Veterans by Hansang Bae
Press Release
SharkFest 2013 Marks 15th Anniversary of Wireshark
Packet Challenge
The SharkFest 2013 Packet Challenge answer key is online at Wireshark University.
CONGRATULATIONS to the winners of the Packet Challenge (and an AirPcap Nx and Cascade Pilot PE license): Clay Maddox, University of North Florida (100%, but missed the bonus Challenge #7) Gareth Sydie, G-Research (Missed 1 Challenge but nailed the bonus one)
Keynote Presentations
History of the Wireshark Project - Reminiscing on the 15-Year-Old Project
Gerald Combs, Ethereal/Wireshark Project Founder + Special Guests
Ode to Gerald: "Gerald Combs, Man...Myth...Mystery"
A Wireshark University Production
"The Nice Thing About Standards is That There are so Many of Them!” Musings of an Early Networker
Rich Seifert, M.S.E.E., M.B.A., J.D., President of Networks and Communications Consulting
To Engineer is Human…So is Being Lazy: A Conversation on Network Vulnerability
Charles Kaplan, Senior Technical Director, Office of the CTO, Riverbed
Network & Application Performance Track Presentations
- NAP-01: Application Performance Analysis by Mike Canney
- NAP-02: It's Not the Network! The Value of Root Cause Analysis by Graeme Bailey
- NAP-03: Microsoft SMB Troubleshooting by Rolf Leutert
- Presentation Video (1:16:59)
- NAP-04: Wireless Network Optimization by Trent Cutler
- NAP-05: Correlating Traces From Multiple Tiers by Paul Offord
- Presentation Video (1:06:33)
- NAP-06: Why Pilot? by Janice Spampinato and Martin Lewald
- Presentation Video (1:04:04)
- NAP-08: Using Wireshark as an Application Engineer by Tim Poth
- NAP-09: Application Performance Analysis by Mike Canney
- NAP-10: Visibility for Wireshark Across Physical, Virtual and SDN by Patrick Leong
- Presentation Video (1:10:07)
- NAP-11: Expanding Wireshark Beyond Ethernet and Network Interfaces
by Mike Kershaw and Mike Ryan - Presentation Video (44:16)
- NAP-12: Packet Optimization and Visibility using Wireshark and pcaps by Gordon Beith
- NAP-13: Wireshark Users Ask the Experts! Moderated by Chris Bidwell
- Presentation Audio (58:10)
- NAP-14: Accessing Packet Traces from Multiple Locations by Bill Eastman
- Presentation Video (52:53)
- NAP-15: Understanding Wireshark's Reassembly Features by Christian Landström
- NAP-16: Limitations of a Laptop: When Does It Start Dropping Packets? by Chris Greer
- Presentation Video (45:02)
- NAP-17: Network Virtualization: the SDN You REALLY Want by Steve Riley
Packet Analysis Presentations
- PA-01: Deep-Dive-Packet-Analysis by Hansang Bae
- Presentation Video (1:16:37)
- PA-02: Introduction to IPv6 Addressing by Nalini Elkins
- Presentation Video (1:12:54)
- PA-03: Debugging Wireless with Wireshark Including Large Trace Files, AirPcap & Cascade Pilot by Megumi Takeshita
- PA-04: Inside the TCP Handshake by Betty DuBois
- Presentation Video (1:17:28)
- Presentation Trace Files
- PA-05: Limitations of a Laptop: When Does It Start Dropping Packets? by Chris Greer
- Presentation Video (45:02)
- PA-07: Troubleshooting From the Field by Herbert Grabmayer
- PA-08: IPv6 Address Planning by Nalini Elkins
- PA-10: Writing a Wireshark Dissector by Graham Bloice (Zip archive)
- PA-11: How to Use Wireshark to Analyze Video by Betty DuBois
- PA-12: WLAN Troubleshooting with Wireshark and AirPcap by Rolf Leutert
- PA-13: Trace Analysis Using Wireshark by Nalini Elkins
- PA-14: Top 5 False Positives when Analyzing Networks by Jasper Bongertz
- PA-15: So You've Found the Suspect Traffic, But What's Causing It? by Graeme Bailey
- Presentation Video (1:17:29)
- PA-16: Wireshark in the Large Enterprise by Hansang Bae
- Presentation Video (1:19:04)
- PA-17: TCP Performance Problem Analysis Through Multiple Network Segments by Jasper Bongoertz and Christian Landström
Security Presentations
- SEC-01: Understanding Encryption Services using Wireshark by Larry Greenblatt
- Presentation Video (44:50)
- SEC-02: VoIP Fundamentals by Phill Shade
- SEC-03: IPv6 Security Assessment Tools & Infrastructure Mitigation by Jeff-Carrell
- SEC-04: Trace File Sanitization NG by Jasper Bongertz
- Presentation Video (1:21:21)
- SEC-05: Using Wireshark to Gather Forensic Evidence on Malware Outbreaks in Enterprise Networks by Christian Landström
- SEC-06: I Can Hear You Tunneling… by Alex Weber
- Presentation Video (51:23)
- SEC-07: Wireshark Network Forensics by Laura Chappell (Zip archive)
- Presentation Video (1:16:39)
- SEC-08: Why is Cryptography So Hard to Get Right by Ron Bowes
- SEC-09: Attack Trends & Techniques by Steve Riley
- Presentation Video (1:09:15)
- SEC-10: Wireshark Network Forensics by Laura Chappell
- Presentation Video (1:16:38)
- SEC-11: IPv6 Security by Nalini Elkins
- SEC-12: Trace File Sanitization NG by Jasper Bongertz
- Presentation Video (1:21:21)
- SEC-13: How 802.11ac Will Hide Problems From Wireshark by Joe Bardwell
- SEC-14: Understanding Encryption Services using Wireshark by Larry Greenblatt
- Presentation Video (44:50)
- SEC-15: Why is Cryptography So Hard to Get Right by Ron Bowes
- SEC-16: I Can Hear You Tunneling… by Alex Weber
- Presentation Video (51:23)
- SEC-17: Wireless Intrusion Detection by Mike Kershaw