SharkFest’18 Retrospective
June 25th - 28th, 2018
Computer History Museum | Mountain View, California
Keynote Presentations
Twenty Years Of Code And Community
Gerald Combs
Wireshark: The Microscope of the 21st Century
Usman Muzaffar
Blogs
SharkFest US 2018 Review, by Denise Fishburne
SharkBytes
Tuesday Classes
-
01: In the Packet Trenches - (Part 1), by Hansang Bae
-
Presentation Video (1:16:46)
-
02: An Introduction to Wireshark: Rookie to Veteran in 2 sessions (Part 1), by Betty DuBois
-
03: Writing a Wireshark Dissector: 3 ways to eat bytes, by Graham Bloice
-
Presentation Video (1:14:11)
-
04: In the Packet Trenches - (Part 2), by Hansang Bae
-
Presentation Video (1:14:11)
-
05: An Introduction to Wireshark: Rookie to Veteran in 2 sessions (Part 2), by Betty DuBois
-
06: Using more of the features of Wireshark to write better dissectors, by Richard Sharpe
-
07: Using Wireshark to solve real problems for real people: Step by-step case studies in packet analysis, by Kary Rogers
-
Presentation Video (1:12:53)
-
08: Traffic analysis of cryptocurrency & blockchain networks, by Brad Palm and Brian Greunke
-
09: Developer Lightning Talks, by Wireshark Core Developers
-
10: Hands-on analysis of multi-point captures, by Christian Landström
-
11: Augmenting packet capture with contextual meta-data: the what, why, and how, by Stephen Donnelly
-
Presentation Video (51:43)
-
12: Point and Shoot Packet! Point your packet effectively & Shoot the trouble with Wireshark, by Megumi Takeshita
-
13: Practical Tracewrangling: exploring capture file manipulation/extraction scenarios, by Jasper Bongertz
-
Presentation Video (1:31:02)
-
14: BGP is not only a TCP session: Learning about the protocol that holds networks together, by Werner Fischer
-
Presentation Video (1:00:04)
-
15: How to get 100% of your data off the wire, by Greg Zemlin
Wednesday Classes
-
16: TCP - Tips, Tricks, & Traces (Part 1), by Chris Greer
-
Presentation Video (1:17:23)
-
17: extcap – Packet capture beyond libpcap/winpcap: bluetooth sniffing, android dumping & other fun stuff!, by Roland Knall
-
Presentation Video (45:35)
-
18: Generating Wireshark Dissectors: A status report, by Richard Sharpe
-
Presentation Video (56:11)
-
19: TCP - Tips, Tricks, & Traces (Part 2), by Chris Greer
-
Presentation Video (1:11:54)
-
20: Wireshark in the “Real World”: Top ways to use Wireshark in the real world of an IT engineer, by Patrick Kinnison
-
21: sFlow: Theory & practice of a sampling technology and its analysis with Wireshark, by Simone Maindardi
-
Presentation Video (1:10:53)
-
22: Writing a TCP analysis expert system, by Jasper Bongertz
-
Presentation Video (1:13:37)
-
23: Playing with “MATCHES”: Using regular expressions for fun & profit, by Mike Hammond
-
Presentation Video (1:21:08)
-
24: Know Abnormal, Find Evil: A Wireshark Beginner’s Guide for the Security Professional, by Maher Adib
-
Presentation Video (1:17:12)
-
25: A deep dive into SIP: everything you need to know to debug & troubleshoot SIP packets, by Betty DuBois
-
26: Analyzing Windows malware traffic with Wireshark, by Bradley Duncan
-
Presentation Video (1:37:01)
-
27: My TCP ain’t your TCP: Stack behavior back then & today, by Simon Lindermann
-
Presentation Video (1:13:49)
-
28: The Packet Doctors are In! Packet trace examinations, by the experts, by Hansang Bae, Jasper Bongertz, Christian Landström, Sake Blok and Kary Rogers
-
29: Baselining with Wireshark to identify & stop unwanted communications, by Jon Ford
-
Presentation Video (59:51)
-
30: BGP is not only a TCP session: Learning about the protocol that holds networks together, by Werner Fischer
-
Presentation Video (1:00:04)
Thursday Classes
-
31: Traffic analysis of cryptocurrency & blockchain networks, by Brad Palm and Brian Greunke
-
Presentation Video (1:21:15)
-
32: We’ll never do it right: A look at security, what we’re doing and how we’re trying to fix things, by Mike Kershaw
-
Presentation Video (1:26:03)
-
33: Wireshark CLI tools & scripting, by Sake Blok
-
Presentation Video (1:11:14)
-
34: Patterns in TCP retransmissions: Using Wireshark to better understand the retransmission process, by Scott Reid
-
Presentation Video (1:11:33)
-
35: Behind the Green Lock: Examining SSL encryption/decryption using Wireshark, by Ross Bagurdes
-
Presentation Video (1:02:20)
-
36: Wireshark and beyond! Complementing your Wireshark analysis with other open source & low-cost tools, by Mike Canney
-
37: Packet monitoring in the days of IoT and Cloud, by Luca Deri
-
Presentation Video (1:17:09)
-
38: Baselining with Wireshark to identify & stop unwanted communications, by Jon Ford
-
Presentation Video (59:51)
-
39: Introduction to practical network signature development for open source IDS (Part 1), by Jason Williams and Jack Mott
-
40: Mangling packets on the fly with divert sockets: how to hack a Cisco router ACL, by Kary Rogers
-
Presentation Video (1:04:33)
-
41: My TCP ain’t your TCP: Stack behavior back then and today, by Simon Lindermann
-
Presentation Video (1:13:49)
-
42: Introduction to practical network signature development for open source IDS (Part 2), by Jason Williams and Jack Mott
-
43: OPEN FORUM: Aha! Moments in packet analysis, by Chris Greer
-
44: Analyzing Windows malware traffic with Wireshark, by Bradley Duncan
-
Presentation Video (1:37:01)
-
45: Introduction to practical network signature development for open source IDS (Part 3), by Jason Williams and Jack Mott
A Word of Thanks
SharkFest’18 US celebrated the 20th anniversary of the Wireshark project and proved a blazing success thanks to the generous, giving community in attendance. Particular thanks to Gerald Combs and his merry band of core developers for inspiring the many first-time participants, by opening with a keynote that illuminated the 20-year history of the project, to Laura Chappell for creating a truly crowd-pleasing Packet Palooza Pub Quiz, to Usman Muzaffar for his thoughtful keynote that explained why Wireshark can be considered the microscope of the 21st century, to instructors who selflessly donated time and wisdom to educate and mentor participants, to sponsors who so generously provided the resources to make the conference possible, to the Computer History Museum Events team for their expert guidance, to tireless caterers who served up varied and delicious daily fare, to Albert our AV Angel, to a staff and volunteer crew who once again went overboard in making the conference as smooth and pleasant an experience as possible for attendees, and to Aaron and Lainey for delighting us all with their golden intelligence!