SharkFest’12 Retrospective
June 24th - 27th, 2012
UC Berkeley, Clark Kerr Campus | Berkeley, California
Blogs
Press Release
Global Wireshark Developer and User Community Connected Through Successful Sharkfest ‘12 Educational Conference
Riverbed Announces Sharkfest 2012
Keynote Presentation
In The Cloud, Everything You Think You Know Is Wrong by Steve Riley
Beginner/Intermediate Track Presentations
- BI-1: Using Wireshark Software as an Applications Engineer by Tim Poth
- BI-2: Introduction to IPv6 Addressing - (Part 1 of 4) by Nalini Elkins
- BI-3: It’s Not the Network! The Value of Root Cause Analysis by Graeme Bailey
- BI-4: Using Wireshark Software with a Cloudshark Plug-in by Joe McEachern and Zach Chadwick
- BI-5: ICMPv6 - (Part 2 of 4) by Nalini Elkins
- BI-6: Wireshark Software and 802.11ac Wireless Evolution by Joe Bardwell
- BI-7: VoIP Analysis Fundamentals by Phill Shade
- BI-8a: Wireshark Software Case Studies by Phill Shade
- BI-8b: Wireshark Software Case Studies by Tim Poth
- BI-8c: Wireshark Software Case Studies by Megumi Takeshita
- BI-8d: Wireshark Software Case Studies by Graeme Bailey
- BI-9: Application Performance Analysis using Wireshark Software and Riverbed Technology Cascade® Software by Mike Canney
- BI-10: Build a HOT Security Profile Using Cool New Features! by Laura Chappell
- BI-11: Inside the TCP Handshake by Betty DuBois, BI-11 Trace Files
- BI-12 Wireshark 1.8 – 16 New Wireshark Features to Drool Over! by Laura Chappell
- BI-13: IPv6 Transition Techniques (Part 3 of 4) by Nalini Elkins
- BI-14 IPv6 Address Planning (Part 4 of 4) by Nalini Elkins
- BI-15: Using Wireshark Software as an Applications Engineer by Tim Poth
- BI-16: Using Lua to Implement the Cloudshark Plug-in by Joe McEachern and Zach Chadwick
- BI-17: It’s Not the Network! The Value of Root Cause Analysis by Graeme Bailey
- BI-18: Understanding Encryption Services Using Wireshark Software by Larry Greenblatt
Advanced Track Presentations
- A-1: Deep Dive Packet Analysis by Hansang Bae
- A-2: Understanding Encryption Services Using Wireshark Software by Larry Greenblatt
- A-3: Tuning Win7 Using Wireshark’s TCP Stream Graph (case study) by Rolf Leutert
- A-4: Leveraging Openflow to create a Large Scale and Cost Effective, Packet Capture Network by Rich Groves
- A-5: Analyzing WLAN Roaming Problems (case study) by Rolf Leutert
- A-6: Open WIPS-ng by Thomas D’Otreppe
- A-7: Wireshark Software in the Large Enterprise by Hansang Bae
- A-8: SMB/CIFS Analysis by Betty DuBois, A-8 Traces and Profile Files
- A-9: Spectrum Analysis & Visual Packet Analysis by Ryan Woodings
- A-10: Tuning Win7 Using Wireshark’s TCP Stream Graph (case study) by Rolf Leutert
- A-11: Pervasive Visibility in the Clouded Data Center - Distributed Real-Time Monitoring and Wireshark Software Drill Down on-Demand by Rony Kay
- A-12: Effects of Receiver-Side Window Scaling on Enterprise Networks by Christian Landstroem
- A-13: Secrets of Vulnerability Scanning: Nessus, Nmap and More by Ron Bowes
- A-14: [SSL Troubleshooting with Wireshark Software](/retrospective/sfus/presentations12/MB-1_SSL_Troubleshooting_with _Wireshark_Software.pdf “Download presentation PDF”) by Sake Blok, Additional Lab Files
- A-15: SMB/CIFS Analysis by Betty DuBois, A-15 Traces and Profile Files
- A-16: Deep Dive Packet Analysis by Hansang Bae
- A-17: Secrets of Vulnerability Scanning: Nessus, Nmap and More by Ron Bowes
- A-18: Effects of Receiver-Side Window Scaling on Enterprise Networks by Christian Landstroem
Mixed Bag Track Presentations
- MB-1: [SSL Troubleshooting with Wireshark Software](/retrospective/sfus/presentations12/MB-1_SSL_Troubleshooting_with _Wireshark_Software.pdf “Download presentation PDF”) by Sake Blok
- MB-2: SSL Troubleshooting Hands-on Lab Files by Sake Blok
- MB-3: Trace File Case Files by Jasper Bongertz
- MB-4: More Trace Files Case Files - Hands-on Lab by Jasper Bongertz
- MB-5: Troubleshooting from the Field by Herbert Grabmayer
- MB-6: Introduction to WiFi Security and Aircrack-ng by Thomas D’Otreppe, MB-6 Trace Files
- MB-7: Network Forensics Analysis: A Hands-On Look at the New Paradigm in Network Security by Phill Shade
- MB-8: Powershell: The New Command Shell for Windows in Combination with T-Shark by Graham Bloice, MB-8 Presentation Capture Files
- MB-11: Trace File Case Files by Jasper Bongertz
- MB-12: More Trace File Case Files by Jasper Bongertz
- MB-13: Building Your Own Wireless Packet Capture Platform by Mike Kershaw
- MB-14: What’s Old is New Again: Evolving Network Security Threats by Phill Shade
A Word of Thanks
Another Sharkfest has come and gone, and we thank each participant, sponsor, presenter, keynote speaker, coordinator, caterer, staff and general support person for making this a successful, richly educational event once again. All session presentations are available from this page, and recordings of many sessions can be found at www.lovemytool.com.
Platinum Level
Silver Level
](http://www.metageek.net/)[![](/img/sponsors/gigamon_logo.png)](http://www.gigamon.com/)