SharkFest’16 EUROPE Retrospective
October 17-19
Papendal Hotel | Arnhem, the Netherlands
Keynote Presentation
Wireshark Behind The Scenes
Gerald Combs
Blogs
SharkFest ‘16 Europe Recap, by Jasper Bongertz
The Network Capture Playbook Part 1, by Jasper Bongertz
The Network Capture Playbook Part 2, by Jasper Bongertz
The Network Capture Playbook Part 3, by Jasper Bongertz
Tuesday Classes
-
01: In the Packet Trenches (Part 1), by Hansang Bae
-
Presentation Video (1:16:32)
-
02: Scaling Up: How to Profitably use Wireshark for Analyzing Large Traces & High-Speed Network Links, by Luca Deri
-
03: In the Packet Trenches (Part 2), by Hansang Bae
-
Presentation Video (1:16:32)
-
04: Common Packets in a Windows/Active Directory Environment: How a Windows Client Communicates in an Enterprise Network, by Ulrich Heilmeier
-
05: Tackling the Haystack: How to Process Large Numbers of Packets, by Jasper Bongertz
-
Presentation Video (1:19:36)
-
06: Troubleshooting 802.11 with Monitoring Mode: Finding Patterns in your pcap, by Thomas Baudelet
-
07: SSL troubleshooting with Wireshark (and Tshark), by Sake Blok
-
Presentation Video (1:15:44)
-
08: Wireshark as a Spy Watermark Pen: Decrypting & Retrieving Information from Packets, by Megumi Takeshita
-
09: The Little Thing Called “Micro Burst”: Why Massive Packet Loss can occur even in Low- Bandwidth-Usage Scenarios, by Christian Reusch
-
Presentation Video (0:51:36)
-
10: Dissecting Man-on-the Side Attacks: Analysis of Active TCP Packet Injection Attacks, by Erik Hjelmvik
Wednesday Classes
-
11: Forensic Network Analysis in the Time of APTs, by Christian Landström
-
Presentation Video (1:17:06)
-
12: Writing a Wireshark Dissector using WSGD, Lua & C: 3 Ways to Eat Bytes, by Graham Bloice
-
13: Using Wireshark to Solve Real Problems for Real People: Step-by-Step Real-World Case Studies in Packet Analysis, by Kary Rogers
-
14: Viewing Snort Alerts using Wireshark: Understanding Alerts and Using the Snort Dissector to See Why & How Snort Detects Them, by Martin Mathieson
-
15: Troubleshooting WLANs (Part 1): Layer 1 & 2 Analysis using WiSpy & AirPcap, by Rolf Leutert
-
Presentation Video (1:14:23)
-
16: Top 5 False Positives: Knowing When a Finding Doesn’t Help, by Jasper Bongertz
-
17: Troubleshooting WLANs (Part 2): Layer 1 & 2 Analysis using WiSpy & AirPcap, by Rolf Leutert
-
Presentation Video (1:12:01)
-
18: Troubleshooting with Layer 2 Control Protocols, by Werner Fischer
-
19: Windows Filesharing De-Mystified: SMB with a Eureka! Effect, by Eduard Blenkers
-
Presentation Video (1:04:07)
-
20: Inside the Wireshark Core Developer Team: How Wireshark Development Works!, by Alexis LaGoutte