SharkFest’16 CONFERENCE SCHEDULE

= Beginner = Intermediate = Advanced

Shuttle departs from Conference Hotels (Shuttle Stop Locations) to Computer History Museum

Domain Hotel - 4:30 pm
Maple Tree Inn - 4:45 pm
AND
Domain Hotel - 5:30 pm
Maple Tree Inn - 5:45 pm

SharkFest Badge Pick-Up (2nd Floor Lobby)

Welcome Dinner and Reception (Grand Hall – 2nd Floor)

Developer Den and The Reef Open (Grand Hall – 2nd Floor)

Shuttle departs from Computer History Museum (Shuttle Stop Location) to Conference Hotels

Speaker Content Header Is Header

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed vitae diam metus. Donec cursus magna eget sem convallis facilisis. Vestibulum dictum nibh at ullamcorper tincidunt. Phasellus scelerisque nisl non ullamcorper pellentesque. Nunc sagittis, felis in feugiat mollis, libero eros consectetur elit non cursus lacus nisl at dolor.

Speaker Content Header Is Header

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed vitae diam metus. Donec cursus magna eget sem convallis facilisis. Vestibulum dictum nibh at ullamcorper tincidunt. Phasellus scelerisque nisl non ullamcorper pellentesque. Nunc sagittis, felis in feugiat mollis, libero eros consectetur elit non cursus lacus nisl at dolor.

Speaker Content Header Is Header

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed vitae diam metus. Donec cursus magna eget sem convallis facilisis. Vestibulum dictum nibh at ullamcorper tincidunt. Phasellus scelerisque nisl non ullamcorper pellentesque. Nunc sagittis, felis in feugiat mollis, libero eros consectetur elit non cursus lacus nisl at dolor.

Speaker Content Header Is Header

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed vitae diam metus. Donec cursus magna eget sem convallis facilisis. Vestibulum dictum nibh at ullamcorper tincidunt. Phasellus scelerisque nisl non ullamcorper pellentesque. Nunc sagittis, felis in feugiat mollis, libero eros consectetur elit non cursus lacus nisl at dolor.

Speaker Content Header Is Header

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed vitae diam metus. Donec cursus magna eget sem convallis facilisis. Vestibulum dictum nibh at ullamcorper tincidunt. Phasellus scelerisque nisl non ullamcorper pellentesque. Nunc sagittis, felis in feugiat mollis, libero eros consectetur elit non cursus lacus nisl at dolor.

Speaker Content Header Is Header

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed vitae diam metus. Donec cursus magna eget sem convallis facilisis. Vestibulum dictum nibh at ullamcorper tincidunt. Phasellus scelerisque nisl non ullamcorper pellentesque. Nunc sagittis, felis in feugiat mollis, libero eros consectetur elit non cursus lacus nisl at dolor.

Speaker Content Header Is Header

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed vitae diam metus. Donec cursus magna eget sem convallis facilisis. Vestibulum dictum nibh at ullamcorper tincidunt. Phasellus scelerisque nisl non ullamcorper pellentesque. Nunc sagittis, felis in feugiat mollis, libero eros consectetur elit non cursus lacus nisl at dolor.

Opening Keynote: “The Ancient History of Computers and Network Sniffers"

Len Shustek, Network Pioneer, Co-Founder of Network General, Chairman of the Board, Computer History Museum

In the Packet Trenches

Hansang Bae

T-Shark for the Win

Christian Landstrom

Tackling the Haystack: How to Process Large Numbers of Packets – Part 1

Jasper Bongertz

Tackling the Haystack: How to Process Large Numbers of Packets – Part 2

Jasper Bongertz

We Still Don’t Get It! Security is Still Hard

TCP Tips, Tricks, and Traces: Let’s Chat About What Makes Applications Crawl

Network Baselining with Wireshark to Identify and Stop Unwanted Communications

Top 10 Wireshark Features

Writing a Dissector: 3 Ways to Eat Bytes

Analyzing and Re-implementing a Proprietary Protocol

Troubleshooting IPv6 with Wireshark – Part 1

HANDS-ON LAB

Troubleshooting IPv6 with Wireshark – Part 2

HANDS-ON LAB

Vendor Showcase Dinner and Reception

Shuttle departs from Computer History Museum (Shuttle Stop Location) to Conference Hotels

Shark Bytes Presentations

(Hahn Auditorium – 2nd Floor)

Capture Filter Sorcery: How to Use Complex BPF Capture Filters in Wireshark

Advanced Wireshark Display Filters: How to Zoom in on the 10 Packets You Actually Need

Markers – Beacons in an Ocean of Packets

Detection and Verification of IoCs (Indicators of Compromise)

Cisco ACI and Wireshark: Getting Back Our Data

Tempering tshark & tcpdump with tmux

Troubleshooting with Layer 2 Control Protocols

Troubleshooting a Multi-Tier Application in a Production Environment

Adventures in Packet Analysis: Run Wireshark Everywhere

Determining Topology from a Capture File

Wireshark 2.0 Tips for HTTP1/2 Analysis

The Packet A(nalysis) Team: Case Studies in Helping Solve Problems with Packet Analysis

Open Time - Visit the Reef to turn in your Packet Challenge Answers!

Attendee Dinner and Reception

Grand Hall - 2nd Floor

Shuttle departs from Computer History Museum (Shuttle Stop Location) to Conference Hotels

​Troubleshooting in the Large Enterprise – Part 1

​Troubleshooting in the Large Enterprise – Part 2

​Using Wireshark Command Line Tools & Scripting

​Top 5 False Positives

Forensic Network Analysis in the Time of APTs

Analyzing Suspicious Traffic

SDN/OpenFlow Analysis

TCP Tips, Tricks, and Traces: Let’s Chat About What Makes Applications Crawl

WiFi Capture and Injection on Various OSes - Revisited

Learning About Networking By Using Wireshark with GNS3: Learn Safely in an Emulator

Using Wireshark to Prove Root Cause: Real-World Troubleshooting Tales

We Still Don’t Get It! Security is Still Hard

Closing Reception

Courtyard - 1st Floor

Shuttle departs from Computer History Museum (Shuttle Stop Location) to Conference Hotels

Pre-Conference 3-Day “Troubleshooting with Wireshark” Course with Laura Chappell SCHEDULE

Continental Breakfast

Check-in and Badge Pick-up

Instruction

LUNCH

Instruction

Speaker Content Header Is Header

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed vitae diam metus. Donec cursus magna eget sem convallis facilisis. Vestibulum dictum nibh at ullamcorper tincidunt. Phasellus scelerisque nisl non ullamcorper pellentesque. Nunc sagittis, felis in feugiat mollis, libero eros consectetur elit non cursus lacus nisl at dolor.

Speaker Content Header Is Header

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed vitae diam metus. Donec cursus magna eget sem convallis facilisis. Vestibulum dictum nibh at ullamcorper tincidunt. Phasellus scelerisque nisl non ullamcorper pellentesque. Nunc sagittis, felis in feugiat mollis, libero eros consectetur elit non cursus lacus nisl at dolor.

Speaker Content Header Is Header

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed vitae diam metus. Donec cursus magna eget sem convallis facilisis. Vestibulum dictum nibh at ullamcorper tincidunt. Phasellus scelerisque nisl non ullamcorper pellentesque. Nunc sagittis, felis in feugiat mollis, libero eros consectetur elit non cursus lacus nisl at dolor.

Speaker Content Header Is Header

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed vitae diam metus. Donec cursus magna eget sem convallis facilisis. Vestibulum dictum nibh at ullamcorper tincidunt. Phasellus scelerisque nisl non ullamcorper pellentesque. Nunc sagittis, felis in feugiat mollis, libero eros consectetur elit non cursus lacus nisl at dolor.

Speaker Content Header Is Header

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed vitae diam metus. Donec cursus magna eget sem convallis facilisis. Vestibulum dictum nibh at ullamcorper tincidunt. Phasellus scelerisque nisl non ullamcorper pellentesque. Nunc sagittis, felis in feugiat mollis, libero eros consectetur elit non cursus lacus nisl at dolor.

Speaker Content Header Is Header

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed vitae diam metus. Donec cursus magna eget sem convallis facilisis. Vestibulum dictum nibh at ullamcorper tincidunt. Phasellus scelerisque nisl non ullamcorper pellentesque. Nunc sagittis, felis in feugiat mollis, libero eros consectetur elit non cursus lacus nisl at dolor.

Speaker Content Header Is Header

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Sed vitae diam metus. Donec cursus magna eget sem convallis facilisis. Vestibulum dictum nibh at ullamcorper tincidunt. Phasellus scelerisque nisl non ullamcorper pellentesque. Nunc sagittis, felis in feugiat mollis, libero eros consectetur elit non cursus lacus nisl at dolor.

Continental Breakfast

Instruction

LUNCH

Instruction

Introduction to Wireshark: Making Sense of the Matrix

Visualizations & Correlations in Troubleshooting

IPv6 in Wireshark

Changing Wireshark with Lua: Writing a Lua Plug-in to Create a Custom Decoder

Writing a Wireshark Dissector Using WSGD, Lua and C

Reverse-Engineering a Proprietary Protocol

The Wireless Side of Wireshark

Matching Packets in Multiple Network Traces

Free Time - Visit the Reef!

Vendor Showcase Dinner and Reception

Begins in the Grand Hall - 2nd Floor

Continental Breakfast

Instruction

LUNCH

Instruction

Simple Wireless Packet Capture on Android

Troubleshooting Routing Protocols with Wireshark

Understanding Wireshark's Reassembly Features

Discover WLANs with Wireshark, AirPcap & WiSpy: Troubleshooting WLANs using 802.11 Management & Control Frames

How To Get the Packets: Packet Capture Techniques for the Enterprise

De-duping Packet Capture Files at Layer 3: Using Wiretap to Create a Custom De-duping App

TCP Analysis: Tips & Case Studies

Capturing Mobile Device Traffic with Wireshark

Open Time - Visit the Reef!

Attendee Dinner and Reception

Grand Hall - 2nd Floor

Troubleshooting the TCP Handshake

T-Shark for the Win!

Zen & The Art of Packet Capturing: Packet Capture Techniques in Different Scenarios

Top 5 False Positives

CLOSING KEYNOTE: Wireshark in 2016 and Beyond and Packet Challenge Awards Ceremony

Hahn Auditorium - 2nd Floor

Root Cause in Complex Networks: Tips & Lessons from Fast-Paced & Enterprise Financials

Wireless Troubleshooting Tips using AirPcaps: DFS & Module Debugging

Why is FTP So Slow? Which End is Holding it Up?

The Anatomy of a Vulnerability

Network Troubleshooting Using ntop

How Did That Happen? Practical Techniques for Analyzing Suspicious Traffic

Using the TRANSUM Wireshark Plugin to Measure Application Performance

Wireshark and the Art of Packet Analysis

Food and Farewells

Courtyard - 1st Floor