Keynote Presentation
The Ancient History of Computers and Network Sniffers
Len Shustek
Blogs
SharkFest'16 Recap by Jasper Bongertz
The Network Capture Playbook Part 1 by Jasper Bongertz
The Network Capture Playbook Part 2 by Jasper Bongertz
The Network Capture Playbook Part 3 by Jasper Bongertz
The Network Capture Playbook Part 4 by Jasper Bongertz
The Network Capture Playbook Part 5 by Jasper Bongertz
SharkBytes
Tuesday Classes
- 01: In the Packet Trenches by Hansang Bae
- Presentation Video (1:16:32)
- 02: We Still Don’t Get It! Security is Still Hard by Mike Kershaw
- 03: Writing a Dissector: 3 Ways to Eat Bytes by Graham Bloice
- 04: T-Shark for the Win by Christian Landström
- Presentation Video (1:14:05)
- 05: TCP Tips, Tricks, and Traces: Let’s Chat About What Makes Applications Crawl by Chris Greer
- Presentation Video (1:02:21)
- 06: Analyzing and Re-Implementing a Proprietary Protocol by Jonah Stiennon
- 07: Tackling the Haystack: How to Process Large Numbers of Packets – Part 1 by Jasper Bongertz
- 08: Network Baselining with Wireshark to Identify and Stop Unwanted Communications by Jon Ford
- 09: Troubleshooting IPv6 with Wireshark – Part 1 by Jeff Carrell
- 10: Tackling the Haystack: How to Process Large Numbers of Packets – Part 2 by Jasper Bongertz
- Presentation Video (1:17:22)
- 11: Top 10 Wireshark 2 Features by Laura Chappell
- 12: Troubleshooting IPv6 with Wireshark – Part 2 by Jeff Carrell
Wednesday Classes
- 13: Capture Filter Sorcery: How to Use Complex BPF Capture Filters in Wireshark by Sake Blok
- Presentation Video (1:06:13)
- 14: Cisco ACI and Wireshark: Getting Back Our Data by Karsten Hecker
- 15: Adventures in Packet Analysis: Run Wireshark Everywhere! by Maher Adib
- 16: Advanced Wireshark Display Filters: How to Zoom in on the 10 Packets You Actually Need by Betty DuBois
- Presentation Video (1:09:22)
- 17: Tempering tshark & tcpdump with tmux by Boyd Stephens
- 18: Determining Topology from a Capture File by Chris Bidwell
- 19: Markers – Beacons in an Ocean of Packets by Matthew York
- Presentation Video (54:56)
- 20: Troubleshooting with Layer 2 Control Protocols by Werner Fischer
- 21: Wireshark 2.0 Tips for HTTP1/2 Analysis by Megumi Takeshita
- 22: Detection and Verification of IoCs (Indicators of Compromise) by Jasper Bongertz
- Presentation Video (1:13:00)
- 23: Troubleshooting a Multi-Tier Application in a Production Environment by Captain Brad Palm
- 24: The Packet A(nalysis) Team: Case Studies in Helping Solve Problems with Packet Analysis by Kary Rogers
Thursday Classes
- 25: Troubleshooting in the Large Enterprise – Part 1 by Hansang Bae
- 26: Forensic Network Analysis in the Time of APTs by Christian Landström
- 27: WiFi Capture and Injection on Various OSes – Revisited by Thomas D’Otreppe
- 28: Troubleshooting in the Large Enterprise – Part 2 by Hansang Bae
- Presentation Video (1:13:49)
- 29: Detecting Suspicious Traffic by Laura Chappell
- 30: Learning About Networking by Using Wireshark with GNS3: Learn Safely in an Emulator by John Schreiner
- 31: Using Wireshark Command Line Tools & Scripting by Sake Blok
- Presentation Video (1:16:21)
- 32: SDN/OpenFlow Analysis by Jeff Carrell
- 33: Using Wireshark to Prove Root Cause: Real-World Troubleshooting Tales by Graeme Bailey
- 34: Top 5 False Positives by Jasper Bongertz
- Presentation Video (1:12:26)
- 35: TCP Tips, Tricks, and Traces: Let’s Chat About What Makes Applications Crawl by Chris Greer
- Presentation Video (1:02:21)
- 36: We Still Don’t Get It! Security is Still Hard by Mike Kershaw