Blogs
SharkFest 2014 Recap by Jasper Bongertz
Packet Challenge
The SharkFest 2014 Packet Challenge answer key is online at Wireshark University.
SharkFest Jeopardy
Click here for the full [PDF || PPT] of SharkFest Jeopardy
Keynote Presentations
Continuous Measurement
Vinton Cerf
The Past and Future
Tim O'Neill
The Future of Wireshark: Inside Wireshark Qt
Gerald Combs and Laura Chappell
Beginner Track
- B1: Art of Packet Analysis [PDF || PPT] by Hansang Bae
- Presentation Video (1:09:09)
- B4: Fun with Traces by Stuart Kendrick
- B5: TCP Analysis - First Steps [PDF || PPT] by Jasper Bongertz
- B6: Get Started with HTTP Analysis by Robert Bullen
- B10: Understanding Wiresharks Reassembly Features by Christian Landström
- B11: IPv6 Security Assessment Tools and Infrastructure Mitigation by Jeff Carrell
- B12: VoIP Troubleshooting by Phillip Shade
Intermediate Track
- I1: Best Practices for Packet Collection, Aggregation & Distribution in the Enterprise by J. Scott Haugdahl
- I2: Common Mistakes In Packet Collection by Chris Greer
- Presentation Video (38:16)
- I3: Maximizing Packet Capture Performance [PDF || PPT] by Andrew Brown
- I4: How to Troubleshoot the Top 5 Causes for Poor Application Performance with Wireshark/Pilot by Mike Canney
- I5: Monitoring Mobile Network Traffic (3G/LTE) [PDF || PPT] by Luca Deri
- I6: Getting the Most out of Your SDN by Steve Riley
- I8: Wireshark in the Large Enterprise [PDF || PPT] by Hansang Bae
- I9: Understanding the TCP Expert by Jasper Bongertz
- I11: Visualizing Problems through Packets by Kevin Burns
- Presentation Video (1:07:10)
- I10: Anatomy of a Cyber Attack by Tim O'Neill
- I12: Capturing a Packet from Wire to Wires by Joerg Mayer
- I13: Analysis and Visualization by Robert Bullen
Advanced Track
- A1: Writing a Wireshark Dissector by Graham Bloice
- A2: Defending the Network by Jasper Bongertz and Christian Landström
- A3: Packet Analysis and Visualization with SteelScript by Christopher White
- A5: Diagramming IT Environments by Stuart Kendrick
- A6: Large-Scale Passive Network Monitoring using Ordinary Switches by Justin Scott and Rich Groves
- A7: Dive Even Deeper - Capturing, Analyzing and Filtering System Events by Loris Degioanna and Davide Schiera
- A8: Old & Busted: C-code… New Hotness: Lua! by Hadriel Kaplan
- A9: Wi-Fi Threats and Countermeasures by Gopinath KN
- A11: Definitive Diagnostic Data Deck by Stuart Kendrick
- A12: (Not So) False Positives in Application Performance Analysis by Christian Landström
- A13: Old & Busted: C-code… New Hotness: Lua! by Hadriel Kaplan
SharkBytes
SharkBytes consist of "little crunchy bits of wisdom". Like the immensely popular TED talks, Shark Bytes aim to inform, inspire, surprise, and delight as presenters share their personal perspective on a topic in under 5 minutes.