Keynote Presentations
Latest Wireshark Developments & Road Map
Gerald Combs
Mental Models for Using Network Evidence
Chris Sanders
A Brief Annotated History of Capture
Loris Degioanni
Tuesday Classes
- 01: War story: troubleshooting issues on encrypted links by Christian Landström
- 02: TLS encryption & decryption: What every IT engineer should know about TLS by Ross Bagurdes
- Presentation Video (1:22:25)
- 03: Writing a Wireshark Dissector: 3 ways to eat bytes by Graham Bloice
- Presentation Video (1:18:07)
- 04: Solving (SharkFest) packet capture challenges with only tshark by Sake Blok
- Presentation Video (1:14:11)
- 05: How long is a packet? And does it really matter? by Stephen Donnelly
- Presentation Video (1:17:54)
- 06: Creating dissectors like a pro by generating dissectors by Richard Sharpe
- Presentation Video (1:20:38)
- 07: To Send or not to Send? How TCP congestion control algorithms work by Vladimir Gerasimov
- Presentation Video (1:30:56)
- 08: Taking a bite out of 100GB files by Betty DuBois
- Presentation Video (1:11:33)
- 09: Debugging TLS issues with Wireshark by Peter Wu
- Presentation Video (1:10:44)
- 10: IPv6 troubleshooting with Wireshark by Jeff Carrell
- 11: When TCP reassembly gets complicated by Tom Peterson
- Presentation Video (41:47)
- 12: Jumbo frames & how to catch them by Patrick Kinnison
- 13: Kismet & wireless security 101 by Mike Kershaw
- Presentation Video (1:20:16)
- 14: Tracing the untraceable with Wireshark: a view under the hood by Roland Knall
Wednesday Classes
- 15: Automating cloud infrastructure for analysis of large network captures by Brad Palm & Brian Greunke
- Presentation Video (1:30:15)
- 16: My TCP ain't your TCP - ain't no TCP? by Simon Lindermann
- Presentation Video (1:26:14)
- 17: TLS1.3, DNS over HTTPs, DNS over TLS, QUIC, IPv6 PDM & more!by Nalini Elkins
- 18: Practical Tracewrangling: Exploring capture file manipulation/extraction by Jasper Bongertz
- Presentation Video (1:24:32)
- 19: TCP SACK overview & impact on performance by John Pittle
- Presentation Video (1:11:54)
- 20: IPv6 security assessment tools (aka IPv6 hacking tools) by Jeff Carrell
- Presentation Video (1:35:25)
- 21: Troubleshooting slow networks by Chris Greer
- Presentation Video(1:10:57)
- 22: Analyzing Windows malware traffic with Wireshark (Part 1) by Brad Duncan
- Presentation Video(1:10:57)
- 23: To send or not to send? How TCP congestion control algorithms work by Vladimir Gerasimov
- Presentation Video (1:30:56)
- 24: The packet doctors are in! Packet trace examinations with the experts by Drs. Blok, Bongertz, and Landström
- 25: Analyzing Windows malware traffic with Wireshark (Part 2) by Brad Duncan
- Presentation Video (1:04:26)
- 26: TLS encryption & decryption: what every IT engineer should know about TLS by Ross Bagurdes
- 27: Developer bytes lightning talks by Wireshark Core Developers
- 28: Wireshark visualization TIPS & tricks by Megumi Takeshita
- 29: Kismet & wireless security 101 by Mike Kershaw
- Presentation Video (1:20:16)
Thursday Classes
- 30: Using Wireshark to solve real problems for real people: step-by-step case studies in packet analysis by Kary Rogers
- Presentation Video (1:20:01)
- 31: TCP split brain: compare/contrast TCP effects on client & server with Wireshark (Part 1) by John Pittle
- Presentation Video (1:24:11)
- 32: Kismet & wireless security 101 by Mike Kershaw
- Presentation Video (1:20:16)
- 33: Capture file format deep dive by Jasper Bongertz
- Presentation Video (1:11:14)
- 34: TCP split brain: compare/contrast TCP effects on client & server with Wireshark (Part 2) by John Pittle
- Presentation Video (1:27:25)
- 35: Solving the impossible by Mike Canney
- Presentation Video (1:02:20)
- 36: A deep dive into LDAP: Everything you need to know to debug and troubleshoot LDAP packets by Betty DuBois
- 37: Wireshark visualization TIPS & tricks by Megumi Takeshita
- 38: Enrich your network visibility & analysis with Wireshark & ELK by Tajul Ariffin
- Presentation Video (1:05:55)
- 39: A walkthrough of the SharkFest Group & Individual Packet Challenges by Sake Blok, Christian Landström, and Jasper Bongertz