SharkFest’16 Retrospective
June 13th - 16th, 2016
Computer History Museum | Mountain View, California
Keynote Presentation
The Ancient History of Computers and Network Sniffers
Len Shustek
Blogs
SharkFest’16 Recap, by Jasper Bongertz
The Network Capture Playbook Part 1, by Jasper Bongertz
The Network Capture Playbook Part 2, by Jasper Bongertz
The Network Capture Playbook Part 3, by Jasper Bongertz
The Network Capture Playbook Part 4, by Jasper Bongertz
The Network Capture Playbook Part 5, by Jasper Bongertz
SharkBytes
Tuesday Classes
-
01: In the Packet Trenches, by Hansang Bae
-
Presentation Video (1:16:32)
-
02: We Still Don’t Get It! Security is Still Hard, by Mike Kershaw
-
03: Writing a Dissector: 3 Ways to Eat Bytes, by Graham Bloice
-
04: T-Shark for the Win, by Christian Landström
-
Presentation Video (1:14:05)
-
05: TCP Tips, Tricks, and Traces: Let’s Chat About What Makes Applications Crawl, by Chris Greer
-
Presentation Video (1:02:21)
-
06: Analyzing and Re-Implementing a Proprietary Protocol, by Jonah Stiennon
-
07: Tackling the Haystack: How to Process Large Numbers of Packets – Part 1, by Jasper Bongertz
-
08: Network Baselining with Wireshark to Identify and Stop Unwanted Communications, by Jon Ford
-
09: Troubleshooting IPv6 with Wireshark – Part 1, by Jeff Carrell
-
10: Tackling the Haystack: How to Process Large Numbers of Packets – Part 2, by Jasper Bongertz
-
Presentation Video (1:17:22)
-
11: Top 10 Wireshark 2 Features, by Laura Chappell
-
12: Troubleshooting IPv6 with Wireshark – Part 2, by Jeff Carrell
Wednesday Classes
-
13: Capture Filter Sorcery: How to Use Complex BPF Capture Filters in Wireshark, by Sake Blok
-
Presentation Video (1:06:13)
-
14: Cisco ACI and Wireshark: Getting Back Our Data, by Karsten Hecker
-
15: Adventures in Packet Analysis: Run Wireshark Everywhere!, by Maher Adib
-
16: Advanced Wireshark Display Filters: How to Zoom in on the 10 Packets You Actually Need, by Betty DuBois
-
Presentation Video (1:09:22)
-
17: Tempering tshark & tcpdump with tmux, by Boyd Stephens
-
18: Determining Topology from a Capture File, by Chris Bidwell
-
19: Markers – Beacons in an Ocean of Packets, by Matthew York
-
Presentation Video (54:56)
-
20: Troubleshooting with Layer 2 Control Protocols, by Werner Fischer
-
21: Wireshark 2.0 Tips for HTTP1/2 Analysis, by Megumi Takeshita
-
22: Detection and Verification of IoCs (Indicators of Compromise), by Jasper Bongertz
-
Presentation Video (1:13:00)
-
23: Troubleshooting a Multi-Tier Application in a Production Environment, by Captain Brad Palm
-
24: The Packet A(nalysis) Team: Case Studies in Helping Solve Problems with Packet Analysis, by Kary Rogers
Thursday Classes
-
25: Troubleshooting in the Large Enterprise – Part 1, by Hansang Bae
-
26: Forensic Network Analysis in the Time of APTs, by Christian Landström
-
27: WiFi Capture and Injection on Various OSes – Revisited, by Thomas D’Otreppe
-
28: Troubleshooting in the Large Enterprise – Part 2, by Hansang Bae
-
Presentation Video (1:13:49)
-
29: Detecting Suspicious Traffic, by Laura Chappell
-
30: Learning About Networking, by Using Wireshark with GNS3: Learn Safely in an Emulator, by John Schreiner
-
31: Using Wireshark Command Line Tools & Scripting, by Sake Blok
-
Presentation Video (1:16:21)
-
32: SDN/OpenFlow Analysis, by Jeff Carrell
-
33: Using Wireshark to Prove Root Cause: Real-World Troubleshooting Tales, by Graeme Bailey
-
34: Top 5 False Positives, by Jasper Bongertz
-
Presentation Video (1:12:26)
-
35: TCP Tips, Tricks, and Traces: Let’s Chat About What Makes Applications Crawl, by Chris Greer
-
Presentation Video (1:02:21)
-
36: We Still Don’t Get It! Security is Still Hard, by Mike Kershaw
A Word of Thanks
The success of SharkFest’16 is due in very large part to Gerald Combs and the core developers excellent stewardship of the Wireshark open source project, to the tireless efforts of Laura Chappell who provides innumerable hours of expert instruction before and during the conference, to Laura’s merry band of packet analysis mentors who guide and inform all comers to The Reef, to the world-class presenters who contribute their time and talent to educate the gathered Wireshark community, to the sponsors who so generously donate their time and resources to make the event possible every year, and to the SharkFest crew of volunteer staff without whom the curtain for this event could not be raised. Yottabytes of thanks to all these, and to the attendees who show up every year to immerse themselves in this unique educational experience.
Sponsors
Host Sponsor
Reef Sponsors
Angel Shark Sponsors
In Absentia Sponsors
Honorary Sponsors