SharkFest’14 Retrospective
June 16th - 20th, 2014
Dominican University of California | San Rafael, California
Blogs
SharkFest 2014 Recap, by Jasper Bongertz
Packet Challenge
The SharkFest 2014 Packet Challenge answer key is online at Wireshark University.
SharkFest Jeopardy
Click here for the full PDF of SharkFest Jeopardy
Keynote Presentations
Continuous Measurement
Vinton Cerf
The Past and Future
Tim O’Neill
The Future of Wireshark: Inside Wireshark Qt
Gerald Combs and Laura Chappell
Beginner Track
-
Presentation Video (1:09:09)
-
B4: Fun with Traces, by Stuart Kendrick
-
B5: TCP Analysis - First Steps [PDF || PPT], by Jasper Bongertz
-
B6: Get Started with HTTP Analysis, by Robert Bullen
-
B10: Understanding Wiresharks Reassembly Features, by Christian Landström
-
B11: IPv6 Security Assessment Tools and Infrastructure Mitigation, by Jeff Carrell
-
B12: VoIP Troubleshooting, by Phillip Shade
Intermediate Track
-
I1: Best Practices for Packet Collection, Aggregation & Distribution in the Enterprise, by J. Scott Haugdahl
-
I2: Common Mistakes In Packet Collection, by Chris Greer
-
Presentation Video (38:16)
-
I3: Maximizing Packet Capture Performance [PDF], by Andrew Brown
-
I4: How to Troubleshoot the Top 5 Causes for Poor Application Performance with Wireshark/Pilot, by Mike Canney
-
I5: Monitoring Mobile Network Traffic (3G/LTE) [PDF || PPT], by Luca Deri
-
I6: Getting the Most out of Your SDN, by Steve Riley
-
I8: Wireshark in the Large Enterprise [PDF || PPT], by Hansang Bae
-
I9: Understanding the TCP Expert, by Jasper Bongertz
-
I10: Anatomy of a Cyber Attack, by Tim O’Neill
-
I11: Visualizing Problems through Packets, by Kevin Burns
-
Presentation Video (1:07:10)
-
I12: Capturing a Packet from Wire to Wires, by Joerg Mayer
-
I13: Analysis and Visualization, by Robert Bullen
Advanced Track
- A1: Writing a Wireshark Dissector, by Graham Bloice
- A2: Defending the Network, by Jasper Bongertz and Christian Landström
- A3: Packet Analysis and Visualization with SteelScript, by Christopher White
- A5: Diagramming IT Environments, by Stuart Kendrick
- A6: Large-Scale Passive Network Monitoring using Ordinary Switches, by Justin Scott and Rich Groves
- A7: Dive Even Deeper - Capturing, Analyzing and Filtering System Events, by Loris Degioanna and Davide Schiera
- A8: Old & Busted: C-code… New Hotness: Lua!, by Hadriel Kaplan
- A9: Wi-Fi Threats and Countermeasures, by Gopinath KN
- A11: Definitive Diagnostic Data Deck, by Stuart Kendrick
- A12: (Not So) False Positives in Application Performance Analysis, by Christian Landström
- A13: Old & Busted: C-code… New Hotness: Lua!, by Hadriel Kaplan
SharkBytes
SharkBytes consist of “little crunchy bits of wisdom”. Like the immensely popular TED talks, Shark Bytes aim to inform, inspire, surprise, and delight as presenters share their personal perspective on a topic in under 5 minutes.
A Word of Thanks
Post-conference feedback is in, and the preponderance of attendees agree that SharkFest’14 was a smashing success! We’d like to express our immense gratitude to the developers, keynote speakers, presenters, attendees, sponsors, events staff, Dominican University of California summer conference staff, and volunteers who generously collaborated to coordinate the 7th annual Wireshark community event.