Keynote Presentations
What's New with Wireshark?
Gerald Combs, Sake Blok, and Roland Knall
A Bit About Zeek and Spicy
Vern Paxson and Robin Sommer
Thursday Sessions
- 01: BACNet and Wireshark for Beginners by Werner Fischer
- 02: Going down the retransmission hole by Sake Blok
- 03: IPv6 security assessment tools (aka IPv6 hacking tools) by Jeff Carrell
- 04: Improving packet capture in the DPDK by Stephen Hemminger
- 05: Kismet and Wireless Security 101 by Mike Kershaw
- 06: Packets! Wait... What? A very improvised last-minute Wireshark talk about things you can find in pcap files that are funny, interesting or weird. I don't know. Let's find out together by Jasper Bongertz
- 07: TLS encryption and decryption: What every IT engineer should know about TLS by Ross Bagurdes
- 08: Why an Enterprise Visibility Platform is critical for effective Packet Analysis? by Keval Shah
- 09: Troubleshooting Cloud Network Outages by Chris Hull
- 10: TCP SACK overview & impact on performance (subject to change) by John Pittle
- 11: Automation TIPS & tricks Using Wireshark/tshark in Windows by Megumi Takeshita
- 12: How Long is a Packet? And Does it Really Matter? by Stephen Donnelly
Friday Sessions
- 13: Make the bytes speak to you by Roland Knall
- 14: USB Analysis 101 by Tomasz Moń
- 15: TLS decryption examples by Peter Wu
- 16: The Packet Doctors are in! Packet trace examinations with the experts by Drs. Blok, Greer Landström, Rogers
- 17: Analyzing Honeypot Traffic by Tom Peterson
- 18: Intrusion Analysis and Threat Hunting with Suricata by Josh Stroschein and Jack Mott
- 19: The Other Protocols (used in LTE) by Mark Stout
- 20: Practical Signature Development for Open Source IDS by Jason Williams and Jack Mott
- 21: Ostinato - craft packets, generate traffic by Srivats P
- 22: Introduction to WAN Optimization by John Pittle
- 23: Solving Real World Case Studies by Kary Rogers
- 24: Analyzing 802.11 Powersave Mechanisms with Wireshark by George Cragg