SharkFest’12 Retrospective
June 24th - 27th, 2012
UC Berkeley, Clark Kerr Campus | Berkeley, California
Blogs
Press Release
Global Wireshark Developer and User Community Connected Through Successful Sharkfest ‘12 Educational Conference
Riverbed Announces Sharkfest 2012
Keynote Presentation
In The Cloud, Everything You Think You Know Is Wrong by Steve Riley
Beginner/Intermediate Track Presentations
- BI-1: Using Wireshark Software as an Applications Engineer, by Tim Poth
- BI-2: Introduction to IPv6 Addressing - (Part 1 of 4), by Nalini Elkins
- BI-3: It’s Not the Network! The Value of Root Cause Analysis, by Graeme Bailey
- BI-4: Using Wireshark Software with a Cloudshark Plug-in, by Joe McEachern and Zach Chadwick
- BI-5: ICMPv6 - (Part 2 of 4), by Nalini Elkins
- BI-6: Wireshark Software and 802.11ac Wireless Evolution, by Joe Bardwell
- BI-7: VoIP Analysis Fundamentals, by Phill Shade
- BI-8a: Wireshark Software Case Studies, by Phill Shade
- BI-8b: Wireshark Software Case Studies, by Tim Poth
- BI-8c: Wireshark Software Case Studies, by Megumi Takeshita
- BI-8d: Wireshark Software Case Studies, by Graeme Bailey
- BI-9: Application Performance Analysis using Wireshark Software and Riverbed Technology Cascade® Software, by Mike Canney
- BI-10: Build a HOT Security Profile Using Cool New Features!, by Laura Chappell
- BI-11: Inside the TCP Handshake, by Betty DuBois, BI-11 Trace Files
- BI-12 Wireshark 1.8 – 16 New Wireshark Features to Drool Over!, by Laura Chappell
- BI-13: IPv6 Transition Techniques (Part 3 of 4), by Nalini Elkins
- BI-14 IPv6 Address Planning (Part 4 of 4), by Nalini Elkins
- BI-15: Using Wireshark Software as an Applications Engineer, by Tim Poth
- BI-16: Using Lua to Implement the Cloudshark Plug-in, by Joe McEachern and Zach Chadwick
- BI-17: It’s Not the Network! The Value of Root Cause Analysis, by Graeme Bailey
- BI-18: Understanding Encryption Services Using Wireshark Software, by Larry Greenblatt
Advanced Track Presentations
- A-1: Deep Dive Packet Analysis, by Hansang Bae
- A-2: Understanding Encryption Services Using Wireshark Software, by Larry Greenblatt
- A-3: Tuning Win7 Using Wireshark’s TCP Stream Graph (case study), by Rolf Leutert
- A-4: Leveraging Openflow to create a Large Scale and Cost Effective, Packet Capture Network, by Rich Groves
- A-5: Analyzing WLAN Roaming Problems (case study), by Rolf Leutert
- A-6: Open WIPS-ng, by Thomas D’Otreppe
- A-7: Wireshark Software in the Large Enterprise, by Hansang Bae
- A-8: SMB/CIFS Analysis, by Betty DuBois, A-8 Traces and Profile Files
- A-9: Spectrum Analysis & Visual Packet Analysis, by Ryan Woodings
- A-10: Tuning Win7 Using Wireshark’s TCP Stream Graph (case study), by Rolf Leutert
- A-11: Pervasive Visibility in the Clouded Data Center - Distributed Real-Time Monitoring and Wireshark Software Drill Down on-Demand, by Rony Kay
- A-12: Effects of Receiver-Side Window Scaling on Enterprise Networks, by Christian Landstroem
- A-13: Secrets of Vulnerability Scanning: Nessus, Nmap and More, by Ron Bowes
- A-14: [SSL Troubleshooting with Wireshark Software](/retrospective/sfus/presentations12/MB-1_SSL_Troubleshooting_with _Wireshark_Software.pdf “Download presentation PDF”), by Sake Blok, Additional Lab Files
- A-15: SMB/CIFS Analysis, by Betty DuBois, A-15 Traces and Profile Files
- A-16: Deep Dive Packet Analysis, by Hansang Bae
- A-17: Secrets of Vulnerability Scanning: Nessus, Nmap and More, by Ron Bowes
- A-18: Effects of Receiver-Side Window Scaling on Enterprise Networks, by Christian Landstroem
Mixed Bag Track Presentations
- MB-1: [SSL Troubleshooting with Wireshark Software](/retrospective/sfus/presentations12/MB-1_SSL_Troubleshooting_with _Wireshark_Software.pdf “Download presentation PDF”), by Sake Blok
- MB-2: SSL Troubleshooting Hands-on Lab Files, by Sake Blok
- MB-3: Trace File Case Files, by Jasper Bongertz
- MB-4: More Trace Files Case Files - Hands-on Lab, by Jasper Bongertz
- MB-5: Troubleshooting from the Field, by Herbert Grabmayer
- MB-6: Introduction to WiFi Security and Aircrack-ng, by Thomas D’Otreppe, MB-6 Trace Files
- MB-7: Network Forensics Analysis: A Hands-On Look at the New Paradigm in Network Security, by Phill Shade
- MB-8: Powershell: The New Command Shell for Windows in Combination with T-Shark, by Graham Bloice, MB-8 Presentation Capture Files
- MB-11: Trace File Case Files, by Jasper Bongertz
- MB-12: More Trace File Case Files, by Jasper Bongertz
- MB-13: Building Your Own Wireless Packet Capture Platform, by Mike Kershaw
- MB-14: What’s Old is New Again: Evolving Network Security Threats, by Phill Shade
A Word of Thanks
Another Sharkfest has come and gone, and we thank each participant, sponsor, presenter, keynote speaker, coordinator, caterer, staff and general support person for making this a successful, richly educational event once again. All session presentations are available from this page, and recordings of many sessions can be found at www.lovemytool.com.
Platinum Level
Silver Level
](http://www.metageek.net/)[![](/img/sponsors/gigamon-new.png)](http://www.gigamon.com/)