• Attend
    • About
    • Agenda
    • Why Attend
  • Sponsor
    • Sponsors
    • Become a Sponsor
  • Merch
  • Retrospective

Keynote Presentations

What's New with Wireshark?
Gerald Combs, Sake Blok, and Roland Knall

A Bit About Zeek and Spicy
Vern Paxson and Robin Sommer

Thursday Sessions

  • 01: BACNet and Wireshark for Beginners by Werner Fischer
    • Presentation Video
  • 02: Going down the retransmission hole by Sake Blok
    • Presentation Video
  • 03: IPv6 security assessment tools (aka IPv6 hacking tools) by Jeff Carrell
    • Presentation Video
  • 04: Improving packet capture in the DPDK by Stephen Hemminger
    • Presentation Video
  • 05: Kismet and Wireless Security 101 by Mike Kershaw
    • Presentation Video
  • 06: Packets! Wait... What? A very improvised last-minute Wireshark talk about things you can find in pcap files that are funny, interesting or weird. I don't know. Let's find out together by Jasper Bongertz
    • Presentation Video
  • 07: TLS encryption and decryption: What every IT engineer should know about TLS by Ross Bagurdes
    • Presentation Video
  • 08: Why an Enterprise Visibility Platform is critical for effective Packet Analysis? by Keval Shah
    • Presentation Video
  • 09: Troubleshooting Cloud Network Outages by Chris Hull
  • 10: TCP SACK overview & impact on performance (subject to change) by John Pittle
    • Presentation Video
  • 11: Automation TIPS & tricks Using Wireshark/tshark in Windows by Megumi Takeshita
    • Presentation Video
  • 12: How Long is a Packet? And Does it Really Matter? by Stephen Donnelly
    • Presentation Video

Friday Sessions

  • 13: Make the bytes speak to you by Roland Knall
    • Presentation Video
  • 14: USB Analysis 101 by Tomasz Moń
    • Presentation Video
  • 15: TLS decryption examples by Peter Wu
    • Presentation Video
  • 16: The Packet Doctors are in! Packet trace examinations with the experts by Drs. Blok, Greer Landström, Rogers
  • 17: Analyzing Honeypot Traffic by Tom Peterson
    • Presentation Video
  • 18: Intrusion Analysis and Threat Hunting with Suricata by Josh Stroschein and Jack Mott
    • Presentation Video
  • 19: The Other Protocols (used in LTE) by Mark Stout
    • Presentation Video
  • 20: Practical Signature Development for Open Source IDS by Jason Williams and Jack Mott
    • Presentation Video
  • 21: Ostinato - craft packets, generate traffic by Srivats P
    • Presentation Video
  • 22: Introduction to WAN Optimization by John Pittle
    • Presentation Video
  • 23: Solving Real World Case Studies by Kary Rogers
    • Presentation Video
  • 24: Analyzing 802.11 Powersave Mechanisms with Wireshark by George Cragg
    • Presentation Video

A Word of Thanks

SharkFest'20 Virtual proved to be a blazing success thanks to the generous, giving community in attendance. Particular thanks to Gerald Combs and his merry band of core developers for inspiring the many first-time participants by opening with a keynote that illuminated the 20+ year history of the project, to instructors who selflessly donated time and wisdom to educate and mentor participants, to sponsors who so generously provided the resources to make the conference possible, and to a staff and volunteer crew who once again went overboard in making the conference as smooth and pleasant an experience as possible for attendees!

Sponsor Videos

Host Sponsor

Angel Shark Sponsors

Honorary Sponsors