Keynote Presentations
Twenty Years Of Code And Community
Gerald Combs
Wireshark: The Microscope of the 21st Century
Usman Muzaffar
Blogs
SharkFest US 2018 Review by Denise Fishburne
SharkBytes
Tuesday Classes
- 01: In the Packet Trenches - (Part 1) by Hansang Bae
- Presentation Video (1:16:46)
- 02: An Introduction to Wireshark: Rookie to Veteran in 2 sessions (Part 1) by Betty DuBois
- 03: Writing a Wireshark Dissector: 3 ways to eat bytes by Graham Bloice
- Presentation Video (1:14:11)
- 04: In the Packet Trenches - (Part 2) by Hansang Bae
- Presentation Video (1:14:11)
- 05: An Introduction to Wireshark: Rookie to Veteran in 2 sessions (Part 2) by Betty DuBois
- 06: Using more of the features of Wireshark to write better dissectors by Richard Sharpe
- 07: Using Wireshark to solve real problems for real people: Step by-step case studies in packet analysis by Kary Rogers
- Presentation Video (1:12:53)
- 08: Traffic analysis of cryptocurrency & blockchain networks by Brad Palm and Brian Greunke
- 09: Developer Lightning Talks by Wireshark Core Developers
- 10: Hands-on analysis of multi-point captures by Christian Landström
- 11: Augmenting packet capture with contextual meta-data: the what, why, and how by Stephen Donnelly
- Presentation Video (51:43)
- 12: Point and Shoot Packet! Point your packet effectively & Shoot the trouble with Wireshark by Megumi Takeshita
- 13: Practical Tracewrangling: exploring capture file manipulation/extraction scenarios by Jasper Bongertz
- Presentation Video (1:31:02)
- 14: BGP is not only a TCP session: Learning about the protocol that holds networks together by Werner Fischer
- Presentation Video (1:00:04)
- 15: How to get 100% of your data off the wire by Greg Zemlin
Wednesday Classes
- 16: TCP - Tips, Tricks, & Traces (Part 1) by Chris Greer
- Presentation Video (1:17:23)
- 17: extcap – Packet capture beyond libpcap/winpcap: bluetooth sniffing, android dumping & other fun stuff! by Roland Knall
- Presentation Video (45:35)
- 18: Generating Wireshark Dissectors: A status report by Richard Sharpe
- Presentation Video (56:11)
- 19: TCP - Tips, Tricks, & Traces (Part 2) by Chris Greer
- Presentation Video (1:11:54)
- 20: Wireshark in the “Real World”: Top ways to use Wireshark in the real world of an IT engineer by Patrick Kinnison
- 21: sFlow: Theory & practice of a sampling technology and its analysis with Wireshark by Simone Maindardi
- Presentation Video (1:10:53)
- 22: Writing a TCP analysis expert system by Jasper Bongertz
- Presentation Video (1:13:37)
- 23: Playing with "MATCHES": Using regular expressions for fun & profit by Mike Hammond
- Presentation Video (1:21:08)
- 24: Know Abnormal, Find Evil: A Wireshark Beginner’s Guide for the Security Professional by Maher Adib
- Presentation Video (1:17:12)
- 25: A deep dive into SIP: everything you need to know to debug & troubleshoot SIP packets by Betty DuBois
- 26: Analyzing Windows malware traffic with Wireshark by Bradley Duncan
- Presentation Video (1:37:01)
- 27: My TCP ain’t your TCP: Stack behavior back then & today by Simon Lindermann
- Presentation Video (1:13:49)
- 28: The Packet Doctors are In! Packet trace examinations by the experts by Hansang Bae, Jasper Bongertz, Christian Landström, Sake Blok and Kary Rogers
- 29: Baselining with Wireshark to identify & stop unwanted communications by Jon Ford
- Presentation Video (59:51)
- 30: BGP is not only a TCP session: Learning about the protocol that holds networks together by Werner Fischer
- Presentation Video (1:00:04)
Thursday Classes
- 31: Traffic analysis of cryptocurrency & blockchain networks by Brad Palm and Brian Greunke
- Presentation Video (1:21:15)
- 32: We’ll never do it right: A look at security, what we’re doing and how we’re trying to fix things by Mike Kershaw
- Presentation Video (1:26:03)
- 33: Wireshark CLI tools & scripting by Sake Blok
- Presentation Video (1:11:14)
- 34: Patterns in TCP retransmissions: Using Wireshark to better understand the retransmission process by Scott Reid
- Presentation Video (1:11:33)
- 35: Behind the Green Lock: Examining SSL encryption/decryption using Wireshark by Ross Bagurdes
- Presentation Video (1:02:20)
- 36: Wireshark and beyond! Complementing your Wireshark analysis with other open source & low-cost tools by Mike Canney
- 37: Packet monitoring in the days of IoT and Cloud by Luca Deri
- Presentation Video (1:17:09)
- 38: Baselining with Wireshark to identify & stop unwanted communications by Jon Ford
- Presentation Video (59:51)
- 39: Introduction to practical network signature development for open source IDS (Part 1) by Jason Williams and Jack Mott
- 40: Mangling packets on the fly with divert sockets: how to hack a Cisco router ACL by Kary Rogers
- Presentation Video (1:04:33)
- 41: My TCP ain’t your TCP: Stack behavior back then and today by Simon Lindermann
- Presentation Video (1:13:49)
- 42: Introduction to practical network signature development for open source IDS (Part 2) by Jason Williams and Jack Mott
- 43: OPEN FORUM: Aha! Moments in packet analysis by Chris Greer
- 44: Analyzing Windows malware traffic with Wireshark by Bradley Duncan
- Presentation Video (1:37:01)
- 45: Introduction to practical network signature development for open source IDS (Part 3) by Jason Williams and Jack Mott