SharkFest’16 Retrospective
June 13th - 16th, 2016
Computer History Museum | Mountain View, California
Keynote Presentation
The Ancient History of Computers and Network Sniffers
Len Shustek
Blogs
SharkFest’16 Recap by Jasper Bongertz
The Network Capture Playbook Part 1 by Jasper Bongertz
The Network Capture Playbook Part 2 by Jasper Bongertz
The Network Capture Playbook Part 3 by Jasper Bongertz
The Network Capture Playbook Part 4 by Jasper Bongertz
The Network Capture Playbook Part 5 by Jasper Bongertz
SharkBytes
Tuesday Classes
-
01: In the Packet Trenches by Hansang Bae
-
Presentation Video (1:16:32)
-
02: We Still Don’t Get It! Security is Still Hard by Mike Kershaw
-
03: Writing a Dissector: 3 Ways to Eat Bytes by Graham Bloice
-
04: T-Shark for the Win by Christian Landström
-
Presentation Video (1:14:05)
-
05: TCP Tips, Tricks, and Traces: Let’s Chat About What Makes Applications Crawl by Chris Greer
-
Presentation Video (1:02:21)
-
06: Analyzing and Re-Implementing a Proprietary Protocol by Jonah Stiennon
-
07: Tackling the Haystack: How to Process Large Numbers of Packets – Part 1 by Jasper Bongertz
-
08: Network Baselining with Wireshark to Identify and Stop Unwanted Communications by Jon Ford
-
09: Troubleshooting IPv6 with Wireshark – Part 1 by Jeff Carrell
-
10: Tackling the Haystack: How to Process Large Numbers of Packets – Part 2 by Jasper Bongertz
-
Presentation Video (1:17:22)
-
11: Top 10 Wireshark 2 Features by Laura Chappell
-
12: Troubleshooting IPv6 with Wireshark – Part 2 by Jeff Carrell
Wednesday Classes
-
13: Capture Filter Sorcery: How to Use Complex BPF Capture Filters in Wireshark by Sake Blok
-
Presentation Video (1:06:13)
-
14: Cisco ACI and Wireshark: Getting Back Our Data by Karsten Hecker
-
15: Adventures in Packet Analysis: Run Wireshark Everywhere! by Maher Adib
-
16: Advanced Wireshark Display Filters: How to Zoom in on the 10 Packets You Actually Need by Betty DuBois
-
Presentation Video (1:09:22)
-
17: Tempering tshark & tcpdump with tmux by Boyd Stephens
-
18: Determining Topology from a Capture File by Chris Bidwell
-
19: Markers – Beacons in an Ocean of Packets by Matthew York
-
Presentation Video (54:56)
-
20: Troubleshooting with Layer 2 Control Protocols by Werner Fischer
-
21: Wireshark 2.0 Tips for HTTP1/2 Analysis by Megumi Takeshita
-
22: Detection and Verification of IoCs (Indicators of Compromise) by Jasper Bongertz
-
Presentation Video (1:13:00)
-
23: Troubleshooting a Multi-Tier Application in a Production Environment by Captain Brad Palm
-
24: The Packet A(nalysis) Team: Case Studies in Helping Solve Problems with Packet Analysis by Kary Rogers
Thursday Classes
-
25: Troubleshooting in the Large Enterprise – Part 1 by Hansang Bae
-
26: Forensic Network Analysis in the Time of APTs by Christian Landström
-
27: WiFi Capture and Injection on Various OSes – Revisited by Thomas D’Otreppe
-
28: Troubleshooting in the Large Enterprise – Part 2 by Hansang Bae
-
Presentation Video (1:13:49)
-
29: Detecting Suspicious Traffic by Laura Chappell
-
30: Learning About Networking by Using Wireshark with GNS3: Learn Safely in an Emulator by John Schreiner
-
31: Using Wireshark Command Line Tools & Scripting by Sake Blok
-
Presentation Video (1:16:21)
-
32: SDN/OpenFlow Analysis by Jeff Carrell
-
33: Using Wireshark to Prove Root Cause: Real-World Troubleshooting Tales by Graeme Bailey
-
34: Top 5 False Positives by Jasper Bongertz
-
Presentation Video (1:12:26)
-
35: TCP Tips, Tricks, and Traces: Let’s Chat About What Makes Applications Crawl by Chris Greer
-
Presentation Video (1:02:21)
-
36: We Still Don’t Get It! Security is Still Hard by Mike Kershaw
A Word of Thanks
The success of SharkFest’16 is due in very large part to Gerald Combs and the core developers excellent stewardship of the Wireshark open source project, to the tireless efforts of Laura Chappell who provides innumerable hours of expert instruction before and during the conference, to Laura’s merry band of packet analysis mentors who guide and inform all comers to The Reef, to the world-class presenters who contribute their time and talent to educate the gathered Wireshark community, to the sponsors who so generously donate their time and resources to make the event possible every year, and to the SharkFest crew of volunteer staff without whom the curtain for this event could not be raised. Yottabytes of thanks to all these, and to the attendees who show up every year to immerse themselves in this unique educational experience.
Sponsors
Host Sponsor
Reef Sponsors
Angel Shark Sponsors
In Absentia Sponsors
Honorary Sponsors