SharkFest’20 Virtual US Retrospective
October 12th - 16th, 2020 Online
Keynote Presentations
Latest Wireshark Developments & Road Map
Gerald Combs & Friends
A Bit About Zeek & Spicy
Vern Paxson & Robin Sommer
Thursday Classes
-
01: BACNet and Wireshark for Beginners, by Werner Fischer
-
02: Going down the retransmission hole, by Sake Blok
-
03: IPv6 security assessment tools (aka IPv6 hacking tools), by Jeff Carrell
-
04: Improving packet capture in the DPDK, by Stephen Hemminger
-
05: Kismet and Wireless Security 101, by Mike Kershaw
-
06: Packets! Wait… What? A very improvised last-minute Wireshark talk about things you can find in pcap files that are funny, interesting or weird. I don’t know. Let’s find out together, by Jasper Bongertz
-
07: TLS encryption and decryption: What every IT engineer should know about TLS, by Ross Bagurdes
-
08: Why an Enterprise Visibility Platform is critical for effective Packet Analysis?, by Keval Shah
-
09: Troubleshooting Cloud Network Outages, by Chris Hull
-
10: TCP SACK overview & impact on performance, by John Pittle
-
11: Automation TIPS & tricks Using Wireshark/tshark in Windows, by Megumi Takeshita
-
12: [How Long is a Packet? And Does it Really Matter?], by Dr. Stephen Donnelly
Friday Classes
-
13: Make the bytes speak to you, by Roland Knall
-
14: USB Analysis 101, by Tomasz Mon
-
15: TLS decryption examples, by Peter Wu
-
16: The Packet Doctors are in! Packet trace examinations with the experts with Drs. Bae, Blok, Bongertz & Landström
-
17: Analyzing Honeypot Traffic, by Tom Peterson
-
18: Intrusion Analysis and Threat Hunting with Suricata, by Josh Stroschein and Jack Mott
-
19: The Other Protocols (used in LTE), by Mark Stout
-
20: Practical Signature Development for Open Source IDS, by Jason Williams and Jack Mott
-
21: Ostinato - craft packets, generate traffic, by Srivats P
-
22: Introduction to WAN Optimization, by John Pittle
-
23: Solving Real World Case Studies, by Kary Rogers
-
24: Analyzing 802.11 Powersave Mechanisms with Wireshark, by George Cragg