<?xml version='1.0' encoding='utf-8' ?>
<!-- Made with love by pretalx v2025.2.2. -->
<schedule>
    <generator name="pretalx" version="2025.2.2" />
    <version>1.8</version>
    <conference>
        <title>SharkFest&apos;24 EUROPE</title>
        <acronym>sharkfest-24-eu</acronym>
        <start>2024-11-04</start>
        <end>2024-11-08</end>
        <days>5</days>
        <timeslot_duration>00:05</timeslot_duration>
        <base_url>https://conference.wireshark.org</base_url>
        
        <time_zone_name>Europe/Vienna</time_zone_name>
        
        
        <track name="Beginner" slug="9-beginner"  color="#00ab9b" />
        
        <track name="Intermediate" slug="10-intermediate"  color="#2b9ecf" />
        
        <track name="Expert / Developer" slug="11-expert-developer"  color="#9d6dec" />
        
        <track name="Security" slug="12-security"  color="#72b406" />
        
        <track name="A.I." slug="13-ai"  color="#e60757" />
        
        <track name="Pre-conference class" slug="14-pre-conference-class"  color="#0c590d" />
        
        <track name="Organization" slug="15-organization"  color="#3c8bc4" />
        
    </conference>
    <day index='1' date='2024-11-04' start='2024-11-04T04:00:00+01:00' end='2024-11-05T03:59:00+01:00'>
        <room name='Ballroom A+B+C' guid='06852f1f-32d7-5c11-9bfd-5b214e7b2052'>
            <event guid='87b8e9d0-10bc-537c-950d-ae0740929b53' id='51'>
                <room>Ballroom A+B+C</room>
                <title>Pre-Conference Class I: Core Wireshark Skills for Network Engineers and Security Pros - 2-day class (4-5 November)</title>
                <subtitle></subtitle>
                <type>Pre Conference Class</type>
                <date>2024-11-04T09:00:00+01:00</date>
                <start>09:00</start>
                <duration>08:00</duration>
                <abstract>Throughout this course, we are going to look at real-world examples of how to practically use Wireshark to solve network problems and isolate cybersecurity incidents. This skill will help AllOps (NetOps, SecOps, DevOps) engineers to improve in their analysis and troubleshooting skills. Labs have been designed to give real-world, hands-on experience with protocols using Wireshark.</abstract>
                <slug>sharkfest-24-eu-51-pre-conference-class-i-core-wireshark-skills-for-network-engineers-and-security-pros-2-day-class-4-5-november</slug>
                <track>Pre-conference class</track>
                
                <persons>
                    <person id='9'>Ross Bagurdes</person>
                </persons>
                <language>en</language>
                <description>Wireshark can be intimidating. I remember how it felt when I first started looking at a trace file with Wireshark. Questions started flooding into my mind: What should I look for? Where do I start? How can I find the packets that matter? What filters should I use? What is &apos;normal&apos; and what can I ignore in all this data? I froze under the weight of all the detail in the packets. If you have ever felt that way when looking at a pcap, this is the course for you!</description>
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-24-eu/talk/7GM8RQ/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-24-eu/talk/7GM8RQ/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Palais Sachsen Coburg I-III' guid='3e069877-dab2-577f-865c-f90071dbe9da'>
            <event guid='cf9bd726-cd1d-5f3c-b4a0-7654156282ca' id='52'>
                <room>Palais Sachsen Coburg I-III</room>
                <title>Pre-Conference Class II: Cybersecurity Threat Hunting - Go Deep with Wireshark</title>
                <subtitle></subtitle>
                <type>Pre Conference Class</type>
                <date>2024-11-04T09:00:00+01:00</date>
                <start>09:00</start>
                <duration>08:00</duration>
                <abstract>The field of Cybersecurity has grown tremendously in the past few years. With every new breach, we realize just how important analysis skills have become in identifying, mitigating, and protecting networks. Wireshark is one of the most important tools in the toolbox for identifying threats, spotting unusual behavior, and analyzing malware behavior, we just need to know how to use it. In this class, we will dive deep into traffic flows to learn how Wireshark can be used to analyze different steps in the Cyber Kill Chain.</abstract>
                <slug>sharkfest-24-eu-52-pre-conference-class-ii-cybersecurity-threat-hunting-go-deep-with-wireshark</slug>
                <track>Pre-conference class</track>
                
                <persons>
                    <person id='8'>Chris Greer</person>
                </persons>
                <language>en</language>
                <description>Wireshark is an important skill for those entering the cybersecurity field, as well as seasoned pros who need to dig into the packets. This course is targeted toward Network Engineers with a working understanding of Wireshark who would like to use it for a cybersecurity focus, but don&#8217;t have much experience with threat hunting. Those who want to learn to spot attack patterns, analyze malware, or respond to an incident will enjoy this content!</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-24-eu/talk/KAVG3H/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-24-eu/talk/KAVG3H/feedback/</feedback_url>
            </event>
            
        </room>
        
    </day>
    <day index='2' date='2024-11-05' start='2024-11-05T04:00:00+01:00' end='2024-11-06T03:59:00+01:00'>
        <room name='Ballroom A+B+C' guid='06852f1f-32d7-5c11-9bfd-5b214e7b2052'>
            <event guid='476a9920-7988-5801-87a3-656efdf9c809' id='94'>
                <room>Ballroom A+B+C</room>
                <title>Pre-Conference Class I: Core Wireshark Skills for Network Engineers and Security Pros - 2-day class (4-5 November)</title>
                <subtitle></subtitle>
                <type>Pre Conference Class</type>
                <date>2024-11-05T09:00:00+01:00</date>
                <start>09:00</start>
                <duration>08:00</duration>
                <abstract>Throughout this course, we are going to look at real-world examples of how to practically use Wireshark to solve network problems and isolate cybersecurity incidents. This skill will help AllOps (NetOps, SecOps, DevOps) engineers to improve in their analysis and troubleshooting skills. Labs have been designed to give real-world, hands-on experience with protocols using Wireshark.</abstract>
                <slug>sharkfest-24-eu-94-pre-conference-class-i-core-wireshark-skills-for-network-engineers-and-security-pros-2-day-class-4-5-november</slug>
                <track>Pre-conference class</track>
                
                <persons>
                    <person id='8'>Chris Greer</person>
                </persons>
                <language>en</language>
                <description>Wireshark can be intimidating. I remember how it felt when I first started looking at a trace file with Wireshark. Questions started flooding into my mind: What should I look for? Where do I start? How can I find the packets that matter? What filters should I use? What is &apos;normal&apos; and what can I ignore in all this data? I froze under the weight of all the detail in the packets. If you have ever felt that way when looking at a pcap, this is the course for you!</description>
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-24-eu/talk/C3VWMQ/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-24-eu/talk/C3VWMQ/feedback/</feedback_url>
            </event>
            <event guid='5a2d9749-ec4c-52d7-9faa-8588ab698165' id='48'>
                <room>Ballroom A+B+C</room>
                <title>SharkFest&apos;24 EUROPE Welcome Dinner and Sponsor Showcase</title>
                <subtitle></subtitle>
                <type>Dinner</type>
                <date>2024-11-05T18:00:00+01:00</date>
                <start>18:00</start>
                <duration>02:30</duration>
                <abstract>Let&apos;s kick off the conference in style</abstract>
                <slug>sharkfest-24-eu-48-sharkfest-24-europe-welcome-dinner-and-sponsor-showcase</slug>
                <track>Organization</track>
                
                <persons>
                    <person id='11'>Wireshark Foundation</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-24-eu/talk/YLULZM/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-24-eu/talk/YLULZM/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Palais Sachsen Coburg I-III' guid='3e069877-dab2-577f-865c-f90071dbe9da'>
            <event guid='2caea908-e59a-5d59-99ca-dbb0d32094a5' id='53'>
                <room>Palais Sachsen Coburg I-III</room>
                <title>Pre-Conference Class III: WebRTC Network Analysis Masterclass</title>
                <subtitle></subtitle>
                <type>Pre Conference Class</type>
                <date>2024-11-05T09:00:00+01:00</date>
                <start>09:00</start>
                <duration>08:00</duration>
                <abstract>Web Real-Time Communication (WebRTC) describes a standards-based approach to initiating audio and video communication relationships via IP-based networks, in the simplest case using a browser. WebRTC has become the most significant solution for web-based conferencing in our time. It has been implemented by many conferencing solution manufacturers and providers worldwide. In this Pre Conference Class, Robert and Matthias will take you into the world of analyzing WebRTC traffic and WebRTC solutions with Wireshark. It will enable you capturing and analyzing WebRTC Web Conferencing calls, analyzing the salient call components for potential problems and implement the required measures in your network perimeters to overcome such problems.</abstract>
                <slug>sharkfest-24-eu-53-pre-conference-class-iii-webrtc-network-analysis-masterclass</slug>
                <track>Pre-conference class</track>
                
                <persons>
                    <person id='43'>Matthias Kaiser</person><person id='44'>Robert Hess</person>
                </persons>
                <language>en</language>
                <description>Have you ever wondered why your favorite web conferencing tool sometimes had bad video or audio quality? Did you experience problems connecting, when your VPN is active? Are you responsible, supporting users with their communication needs in diverse network environments? Or did you just stumble across weird UDP traffic in your latest trace files? Then this course is for you. We will explain the insides of the WebRTC communication protocols used in most modern products and show our praxis-proven approach analyzing problems in this field. The course includes hands-on capturing and analyzing problem situations including firewall restrictions and proxy use. To the best of our abilities, we will also address your real live problems you bring to the table.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-24-eu/talk/HDZTV3/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-24-eu/talk/HDZTV3/feedback/</feedback_url>
            </event>
            
        </room>
        
    </day>
    <day index='3' date='2024-11-06' start='2024-11-06T04:00:00+01:00' end='2024-11-07T03:59:00+01:00'>
        <room name='Ballroom A+B+C' guid='06852f1f-32d7-5c11-9bfd-5b214e7b2052'>
            <event guid='41d9a83e-71a9-587e-98b8-d88ddbb970de' id='55'>
                <room>Ballroom A+B+C</room>
                <title>Keynote: Ecosystem Expansion</title>
                <subtitle></subtitle>
                <type>Organization</type>
                <date>2024-11-06T09:00:00+01:00</date>
                <start>09:00</start>
                <duration>00:45</duration>
                <abstract>Gerald Combs &amp; Friends talk about the new developments over the past year</abstract>
                <slug>sharkfest-24-eu-55-keynote-ecosystem-expansion</slug>
                <track>Organization</track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-24-eu/talk/RPQSCC/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-24-eu/talk/RPQSCC/feedback/</feedback_url>
            </event>
            <event guid='c89841a6-cf91-5391-a054-dba96343e417' id='77'>
                <room>Ballroom A+B+C</room>
                <title>3GPP, a walk through the LTE, and 5G networks</title>
                <subtitle></subtitle>
                <type>Short Presentation</type>
                <date>2024-11-06T09:45:00+01:00</date>
                <start>09:45</start>
                <duration>01:00</duration>
                <abstract>We&apos;ll review LTE, and 5G network structure, and some unique protocols that support mobility services.</abstract>
                <slug>sharkfest-24-eu-77-3gpp-a-walk-through-the-lte-and-5g-networks</slug>
                <track>Intermediate</track>
                
                <persons>
                    <person id='17'>Mark Stout</person>
                </persons>
                <language>en</language>
                <description>Look through a few key 3GPP docs that describe mobility call flow. Along with a couple packet walks through mobility events, and VoLTE.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-24-eu/talk/TFGQAU/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-24-eu/talk/TFGQAU/feedback/</feedback_url>
            </event>
            <event guid='05dab7fb-681c-5d23-a899-d7274e541abe' id='73'>
                <room>Ballroom A+B+C</room>
                <title>Mastering Wireshark Filtering</title>
                <subtitle></subtitle>
                <type>Short Presentation</type>
                <date>2024-11-06T11:00:00+01:00</date>
                <start>11:00</start>
                <duration>01:00</duration>
                <abstract>Get to know how to filter properly in Wireshark</abstract>
                <slug>sharkfest-24-eu-73-mastering-wireshark-filtering</slug>
                <track>Beginner</track>
                
                <persons>
                    <person id='10'>Sake Blok</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-24-eu/talk/NTUTHL/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-24-eu/talk/NTUTHL/feedback/</feedback_url>
            </event>
            <event guid='a35bc196-3821-5273-9774-9e67b4ac7136' id='43'>
                <room>Ballroom A+B+C</room>
                <title>Capturing WiFi7, understand WiFi again with catching up an Extremely High Throughput mode of IEEE802.11be</title>
                <subtitle></subtitle>
                <type>Short Presentation</type>
                <date>2024-11-06T13:00:00+01:00</date>
                <start>13:00</start>
                <duration>01:00</duration>
                <abstract>Capturing BE traffic and analyze EHT frame with quick review of IEEE802.11 WLAN communications with security standards.</abstract>
                <slug>sharkfest-24-eu-43-capturing-wifi7-understand-wifi-again-with-catching-up-an-extremely-high-throughput-mode-of-ieee802-11be</slug>
                <track>Intermediate</track>
                
                <persons>
                    <person id='15'>Megumi Takeshita</person>
                </persons>
                <language>en</language>
                <description>WiFi has been upgraded in the next phase, 7th generation bumped up from 6/6E, enabling over 30Gbps wireless communication using 320MHz, 16 streams and 4096 QAM modulation. In this session, we try Intel BE200 adapter to capture actual live traffic of WiFI7 and dissect extended tags of IEEE802.11be using Wireshark. 
And this session includes the basic dissection of WLAN and WiFi security standards, too.
We dissect the management, control and data frames of WiFi and learn mechanisms and standards of IEEE802.11 protocols. It also includes security dissection based on WPA2/WPA3.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-24-eu/talk/PDYKPQ/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-24-eu/talk/PDYKPQ/feedback/</feedback_url>
            </event>
            <event guid='f1b37fe0-c300-5e71-82b8-5c1a81455a51' id='71'>
                <room>Ballroom A+B+C</room>
                <title>Communication breakdown - making online conferencing work in secured company networks</title>
                <subtitle></subtitle>
                <type>Long Presentation</type>
                <date>2024-11-06T14:00:00+01:00</date>
                <start>14:00</start>
                <duration>01:30</duration>
                <abstract>A troubleshooters tale
I routinely help large global enterprises to find problems in their network when our Online conferencing products do not work as expected. The problems range from very low level like broken packet fragmentation to high level like wrong Geolocation detection. 
This brings me in contact with network security in various ways, and I learn about their ideas of securing networks and also how to configure such security systems and have to come up with ideas to make the conferencing software work.
As there is obviously no way around making our networks more secure, the question remains, how do we keep them working at the same time. I will show my approach to these problems.</abstract>
                <slug>sharkfest-24-eu-71-communication-breakdown-making-online-conferencing-work-in-secured-company-networks</slug>
                <track>Intermediate</track>
                
                <persons>
                    <person id='44'>Robert Hess</person>
                </persons>
                <language>en</language>
                <description>High level network requirements of online communication (WebRTC and the other big ones)
Security requirements in modern corporate networks
The everlasting conflict: tighter security vs. faster and more diverse communication connections
Some typical problems with field examples and  how to identify them in Wireshark
	- Analysing UDP performance 
	- DNS - a story of misunderstandings
	- VPN - what could possibly go wrong? 

History excurse : Why is it so complicated 
	- The wild-west times of networked software
	- Things not to do in your software and why not
	- Things not to do in your network and why not
The perfect network - how would it look like?</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-24-eu/talk/TP88BZ/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-24-eu/talk/TP88BZ/feedback/</feedback_url>
            </event>
            <event guid='091cb524-b6fd-5b89-b59e-084b072fcb08' id='72'>
                <room>Ballroom A+B+C</room>
                <title>IPsec VPN Analysis and troubleshooting</title>
                <subtitle></subtitle>
                <type>Long Presentation</type>
                <date>2024-11-06T15:45:00+01:00</date>
                <start>15:45</start>
                <duration>01:30</duration>
                <abstract>With this session we intend to demonstrate how Wireshark can be used to analyze IPSec VPNs in site to site and remote access contexts. We will also present some dysfunctioning cases where Wireshark can be of some help.</abstract>
                <slug>sharkfest-24-eu-72-ipsec-vpn-analysis-and-troubleshooting</slug>
                <track>Intermediate</track>
                
                <persons>
                    <person id='60'>Jean-Paul ARCHIER</person>
                </persons>
                <language>en</language>
                <description>We will present the differents steps of an IPsec connexion (we&apos;ll base our presentation on IKEv2) with the help of Wireshark. We will use some profiles to highlight the most important elements and we&apos;ll detail the colors, columns, filters, buttons used in these profiles . 

Our presentation will  focus mainly on  two site-to site situations :  fhe first illustrating  a VPN without NAT with a simple situation (one tunnel) and a more complex one (several tunnels),  the second one involving some NAT between the two sites.  In each of these labs we will present capture files with functional VPNS and others with some issues. When necessary and possible we&apos;ll useWireshark to decipher the IKE and ESP exchanges.

If some time remains we will present capture files for a VPN between a Windows PC and a central site</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-24-eu/talk/ZLH8RF/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-24-eu/talk/ZLH8RF/feedback/</feedback_url>
            </event>
            <event guid='c7a706bb-283e-537f-ba57-8a78d2f9d6ac' id='85'>
                <room>Ballroom A+B+C</room>
                <title>Let&#8217;s dissect malwares by collecting their syscalls with eBPF</title>
                <subtitle></subtitle>
                <type>Short Presentation</type>
                <date>2024-11-06T17:15:00+01:00</date>
                <start>17:15</start>
                <duration>01:00</duration>
                <abstract>As infrastructure managers, we often have to deal with malwares. Although we do our best to avoid or block them, some slip through the net anyway. Let&apos;s imagine that you or a member of your team got their hands on one of these malicious binaries. How can you find out what its purpose was? You can try to uncompile the binary or explore it in hexadecimal mode, two tried and tested but time-consuming methods. Let&apos;s try a new approach and analyze the malware&apos;s behavior by running it in an isolated environment and collecting all its syscalls using eBPF. The final step will be to explore the captures with Logray, a project forked from Wireshark, especially made to analyze syscall packets captures.</abstract>
                <slug>sharkfest-24-eu-85-let-s-dissect-malwares-by-collecting-their-syscalls-with-ebpf</slug>
                <track>Beginner</track>
                
                <persons>
                    <person id='70'>Thomas Labarussias</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-24-eu/talk/PJCUHK/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-24-eu/talk/PJCUHK/feedback/</feedback_url>
            </event>
            <event guid='ba3a72c0-2ee1-5c61-adce-6a3b7cd66622' id='54'>
                <room>Ballroom A+B+C</room>
                <title>Sponsor Technology Showcase Reception, Treasure Hunt &amp; Dinner</title>
                <subtitle></subtitle>
                <type>Dinner</type>
                <date>2024-11-06T18:30:00+01:00</date>
                <start>18:30</start>
                <duration>03:00</duration>
                <abstract>Join us for a fun night with an opportunity to enjoin wonderful conversations and win some cool prizes!</abstract>
                <slug>sharkfest-24-eu-54-sponsor-technology-showcase-reception-treasure-hunt-dinner</slug>
                <track>Organization</track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-24-eu/talk/UPEDSC/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-24-eu/talk/UPEDSC/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Palais Sachsen Coburg I-III' guid='3e069877-dab2-577f-865c-f90071dbe9da'>
            <event guid='dd09fdc4-505d-5da0-8503-6e736812f7f7' id='58'>
                <room>Palais Sachsen Coburg I-III</room>
                <title>Stratoshark: Or how to inspire your DevOps team to use Wireshark</title>
                <subtitle></subtitle>
                <type>Short Presentation</type>
                <date>2024-11-06T09:45:00+01:00</date>
                <start>09:45</start>
                <duration>01:00</duration>
                <abstract>With Stratoshark, we now have a Wireshark-based tool for analysing log events.

In this session I want to show why Logray has been my first choice for months to analyse and investigate AWS Cloudtrail events in an AWS Organization with around 1000 accounts. There are several advantages compared to the standard tools Athena + Glue and it is simply marvellous.

The session should help to spread the spark of Logray into the Dev(Sec)Ops world. Spread the word.... :-)</abstract>
                <slug>sharkfest-24-eu-58-stratoshark-or-how-to-inspire-your-devops-team-to-use-wireshark</slug>
                <track>Security</track>
                
                <persons>
                    <person id='45'>Uli Heilmeier</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-24-eu/talk/G7FWSD/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-24-eu/talk/G7FWSD/feedback/</feedback_url>
            </event>
            <event guid='119b5703-7fe9-5c8f-81f4-b4c6183fb359' id='86'>
                <room>Palais Sachsen Coburg I-III</room>
                <title>Automatically trigger captures via tcpdump when a suspicious event occurs in your Kubernetes cluster</title>
                <subtitle></subtitle>
                <type>Short Presentation</type>
                <date>2024-11-06T11:00:00+01:00</date>
                <start>11:00</start>
                <duration>01:00</duration>
                <abstract>Falco, a CNCF project, is the de facto solution for runtime threat detection in Linux and Kubernetes environments. It offers complete kernel-level visibility by capturing Syscalls via eBPF, analyzing this flow with a powerful rules engine and alerting when a rule is triggered.
Over time, the Falco ecosystem has grown to include the ability to retrieve events from different sources, such as SaaS or Cloud provider audit logs, and to integrate with dozens of tools for notification, analysis and reaction. The last born in its ecosystem is Falco Talon, a tailor made no-code response engine, which react to the Falco events with out of the box actions, such as terminating a pod, or triggering a tcpdump.
In this talk, listeners will learn the basics of Falco, and will be treated to a real-time demonstration of remediation action against intrusions, with a big focus on the capacity to trigger a tcpdump, to observe what the attacker did following the raised alert.</abstract>
                <slug>sharkfest-24-eu-86-automatically-trigger-captures-via-tcpdump-when-a-suspicious-event-occurs-in-your-kubernetes-cluster</slug>
                <track>Security</track>
                
                <persons>
                    <person id='70'>Thomas Labarussias</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-24-eu/talk/FW933D/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-24-eu/talk/FW933D/feedback/</feedback_url>
            </event>
            <event guid='c55da370-6455-5760-b180-8e9e0142087c' id='80'>
                <room>Palais Sachsen Coburg I-III</room>
                <title>Beyond Network Latency: Chasing Latency up the Stack</title>
                <subtitle></subtitle>
                <type>Short Presentation</type>
                <date>2024-11-06T13:00:00+01:00</date>
                <start>13:00</start>
                <duration>01:00</duration>
                <abstract>This talk is an introduction to intuiting where non-network latency comes from. While it&apos;s usually quite clear how to determine what is network latency and what isn&apos;t, it&apos;s less clear how to dig into the timing differences between packets at different stages of a TCP conversation to direct troubleshooting at different layers of the stack. 

Using a Linux-based web server as an example platform, this talk will demonstrate what network latency looks like, what host latency looks like, and what application/backend latency looks like. To explain what we see in the demonstration, we will also examine the web server to show how packets and requests propagate through the Linux OS to the web server application.

Attendees to this talk will leave with a greater understanding of how to identify latency at different stages of a web request. They will understand the basic Linux kernel and OS structure and how different stresses on a system show up in packet captures.</abstract>
                <slug>sharkfest-24-eu-80-beyond-network-latency-chasing-latency-up-the-stack</slug>
                <track>Intermediate</track>
                
                <persons>
                    <person id='6'>Josh Clark</person>
                </persons>
                <language>en</language>
                <description>&quot;The website is slow, so the network must be having an issue.&quot;

Network engineers skilled with Wireshark are masters of responding to statements like this one. With one peek at the iRTT, one scroll through the TCP stream, and one long-running ping to the web server, network latency can be disproven. But how do we take the next step? How do we help a server admin or application owner identify exactly what is happening?

Packets can isolate latency at the network, the server, and the application, and this talk will walk through how to find and understand those latencies.

Expect a review of identifying network latency. Expect to learn how to isolate both server and application latency. Expect to learn how network data propagates through a Linux server and where it makes pit stops along the way.</description>
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-24-eu/talk/TABABN/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-24-eu/talk/TABABN/feedback/</feedback_url>
            </event>
            <event guid='4fcaea26-68fb-5147-a15d-255099eb47c9' id='64'>
                <room>Palais Sachsen Coburg I-III</room>
                <title>Unlocking Security Insights: Wireshark Techniques for Security Analysts</title>
                <subtitle></subtitle>
                <type>Long Presentation</type>
                <date>2024-11-06T14:00:00+01:00</date>
                <start>14:00</start>
                <duration>01:30</duration>
                <abstract>Packet-level analysis stands as the gold standard in incident response, providing the most detailed evidence during security investigations. Despite its importance, packet analysis is often underutilized, typically considered only as a last resort. This session aims to elevate the use of Wireshark in everyday security practices, demonstrating its effectiveness not just in validating security tool alerts but in gaining a profound understanding of attack methodologies through network traces.

The session will focus on:
Explore and demonstrate methods for SSL interception, comparing browser-based versus proxy-based analysis, including techniques like PCAP over IP for remote capturing.
Investigate Attack Vectors: Learn to identify various network scans and conduct in-depth analyses of successful attacks. We will also highlight a successful attack using Metasploit, capturing and analyzing network traces to deepen our understanding and see examples of useful LUA Plugins for Security.</abstract>
                <slug>sharkfest-24-eu-64-unlocking-security-insights-wireshark-techniques-for-security-analysts</slug>
                <track>Security</track>
                
                <persons>
                    <person id='55'>Walter Hofstetter</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-24-eu/talk/XFQZQA/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-24-eu/talk/XFQZQA/feedback/</feedback_url>
            </event>
            <event guid='fa4eed31-5430-516b-b2e6-68efa5c84171' id='76'>
                <room>Palais Sachsen Coburg I-III</room>
                <title>Kerberos Deep Dive</title>
                <subtitle></subtitle>
                <type>Long Workshop</type>
                <date>2024-11-06T15:45:00+01:00</date>
                <start>15:45</start>
                <duration>01:30</duration>
                <abstract>Kerberos is the bread and butter protocol used for authentication and authorization in a Windows domain.
Like many Windows components, it works fine in the default configuration and offers several options to strengthen its security. This includes the search for old encryption algorithms and the introduction of Kerberos Armoring, a.k.a Kerberos FAST.
This hands-on workshop will take you into the inner workings of Kerberos. We will use Wireshark to identify faulty configurations, misleading messages in event logs and decrypt whatever Windows wants to hide from plain view.
Trace files included: Bring your own laptop!</abstract>
                <slug>sharkfest-24-eu-76-kerberos-deep-dive</slug>
                <track>Security</track>
                <logo>/media/sharkfest-24-eu/submissions/ULC3YU/Kerberos_Lw6xb9v.png</logo>
                <persons>
                    <person id='66'>Eddi Blenkers</person>
                </persons>
                <language>en</language>
                <description>After a quick introduction on standard Kerberos operations we will examine advanced features. This workshop will teach you
* How to configure Wireshark for a speedy analysis of Kerberos packets
* How to identify hosts and accounts that use old encryption protocols
* Why you should use Kerberos Armoring and how to prepare your systems
* How Kerberos encrypts messages and how to decrypt them with Wireshark

Feel free to bring your laptop and click along during the workstation.
Tracefiles are ready for download at https://sharkfest.packet-foo.com/kerberos-deep-dive.zip

A Python interpreter is recommended, but not required.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-24-eu/talk/ULC3YU/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-24-eu/talk/ULC3YU/feedback/</feedback_url>
            </event>
            <event guid='6754da33-880d-5a55-a2a7-24edba8ef884' id='45'>
                <room>Palais Sachsen Coburg I-III</room>
                <title>Deep packet inspection analyses: Unveiling a shocking RDP Attack through unusual protocol combinations</title>
                <subtitle></subtitle>
                <type>Short Presentation</type>
                <date>2024-11-06T17:15:00+01:00</date>
                <start>17:15</start>
                <duration>01:00</duration>
                <abstract>In September 2018, the Internet Crime Complaint Center (IC3), in collaboration with the Department of Homeland Security and the Federal Bureau of Investigation, warned of attackers exploiting legitimate tools like Remote Desktop Protocol (RDP) for malicious purposes. This presentation explores a recently discovered large-scale RDP Tunneling Attack that weaponized the mstshash cookie, a session management mechanism within RDP. The most intriguing aspect of this attack was the attacker&apos;s diverse use of protocols, including TCP, TLS, SSL, MEMCACHE, Socks, WOW, WOWW, MySQL, X11, MQTT, LISP, VICP, RSL, KDSP, ICAP, BitTorrent, CVSPSERVER, NDPS, PTP/IP, TPM, kNet, ECMP, and FF. This talk utilizes deep packet inspection (DPI) analysis to dissect this attack, revealing why seemingly unrelated protocols were chosen and emphasizing the attacker&apos;s strategy to bypass traditional security measures.</abstract>
                <slug>sharkfest-24-eu-45-deep-packet-inspection-analyses-unveiling-a-shocking-rdp-attack-through-unusual-protocol-combinations</slug>
                <track>Security</track>
                <logo>/media/sharkfest-24-eu/submissions/BB3E8B/RDP_Tunneling_Attack_over_MySQL_51iL3u7.PNG</logo>
                <persons>
                    <person id='38'>Michal Soltysik</person>
                </persons>
                <language>en</language>
                <description>Presentation Outline:

(1) Introduction:

- I will briefly explain Remote Desktop Protocol (RDP) and its importance and broad utilization on the Internet.
- I will discuss the role of the mstshash cookie in RDP session management.
- I will introduce the concept of RDP Tunneling Attacks and their potential dangers.

(2) Unveiling the Attack with Deep Packet Inspection (DPI):

- I will analyze the attacker&apos;s use of common protocols, such as TCP, TLS and SSL for tunneling RDP traffic.
- I will deep dive into the lesser-known and very diverse protocols (such as MEMCACHE, Socks, WOW, WOWW, MySQL, X11, MQTT, LISP, VICP, RSL, KDSP, ICAP, BitTorrent, CVSPSERVER, NDPS, PTP/IP, TPM, kNet, ECMP, and FF) used in the attack and their role in tunneling RDP.

(3) Why These Protocols? Identifying Shared Characteristics:

- I will explore the common features of the chosen protocols that make them suitable for tunneling RDP traffic.
- I will discuss how attackers exploit limitations of traditional port-based security measures by using this diverse protocol set.

(4) The Need for Broader Network Monitoring:

- I will explain the limitations of focusing solely on RDP&apos;s standard port (3389).
- I will emphasize the importance of DPI and comprehensive network monitoring to detect attacks hidden within other protocols.

(5) Conclusion:

- I will recap key takeaways: the importance of minimal RDP library usage, dangers of RDP Tunneling Attacks, and the need for broader network monitoring.
- I will conclude by emphasizing the critical need for vigilance against evolving attack methods and the importance of expanding network monitoring practices.

Target Audience:

This presentation is designed for security professionals, network administrators, and anyone interested in understanding advanced attack techniques and network security best practices - especially professionals interested in protocol security.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-24-eu/talk/BB3E8B/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-24-eu/talk/BB3E8B/feedback/</feedback_url>
            </event>
            
        </room>
        
    </day>
    <day index='4' date='2024-11-07' start='2024-11-07T04:00:00+01:00' end='2024-11-08T03:59:00+01:00'>
        <room name='Ballroom A+B+C' guid='06852f1f-32d7-5c11-9bfd-5b214e7b2052'>
            <event guid='c869d858-6fb2-5aa9-aae5-c39ad158d87b' id='66'>
                <room>Ballroom A+B+C</room>
                <title>Panel Discussion</title>
                <subtitle></subtitle>
                <type>Organization</type>
                <date>2024-11-07T09:00:00+01:00</date>
                <start>09:00</start>
                <duration>00:45</duration>
                <abstract>Let us discuss what interesting topics lay ahead of us</abstract>
                <slug>sharkfest-24-eu-66-panel-discussion</slug>
                <track>Beginner</track>
                
                <persons>
                    <person id='1'>Roland Knall</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-24-eu/talk/TBWNC7/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-24-eu/talk/TBWNC7/feedback/</feedback_url>
            </event>
            <event guid='2dc2b387-2107-52b8-a441-0c9b527ad86c' id='60'>
                <room>Ballroom A+B+C</room>
                <title>A Deep Dive Into Traffic Fingerprints using Wireshark</title>
                <subtitle></subtitle>
                <type>Long Presentation</type>
                <date>2024-11-07T09:45:00+01:00</date>
                <start>09:45</start>
                <duration>01:30</duration>
                <abstract>Understanding network traffic fingerprints is crucial for enhancing cybersecurity and network performance. This talk provides a concise exploration of network traffic fingerprints, discussing their definition, identification methods, and practical applications. We will cover techniques like deep packet inspection, flow analysis, and machine learning to capture and analyze traffic patterns. Real-world examples using Wireshark/tshark will illustrate their use in intrusion detection, anomaly detection, and network optimization.

Challenges such as encryption and evolving threats will be addressed, alongside emerging trends in network traffic analysis. Attendees will gain actionable insights on leveraging traffic fingerprints for improved security and efficiency, making this talk essential for network administrators, security professionals, and researchers. 

Presentation slides and pcaps are available at https://tinyurl.com/sf24derinardi</abstract>
                <slug>sharkfest-24-eu-60-a-deep-dive-into-traffic-fingerprints-using-wireshark</slug>
                <track>Intermediate</track>
                
                <persons>
                    <person id='48'>Luca Deri</person><person id='49'>Ivan Nardi</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-24-eu/talk/KCCXJY/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-24-eu/talk/KCCXJY/feedback/</feedback_url>
            </event>
            <event guid='45854f55-12c9-5671-a2e0-4dce5d2ba308' id='90'>
                <room>Ballroom A+B+C</room>
                <title>The Packet Doctors are in! Packet trace examinations with the experts</title>
                <subtitle></subtitle>
                <type>Long Presentation</type>
                <date>2024-11-07T11:30:00+01:00</date>
                <start>11:30</start>
                <duration>01:30</duration>
                <abstract>The experts on this panel have been asked to look at a trace file and help find a reason for certain behaviors by attendees at many SharkFests. Based on this, they&#8217;ve decided to create a public forum for examining individual trace files with a broader audience for a collective learning experience. Trace files will be gathered from attendees prior to SharkFest and only given to the panel members during the session so that the &#8220;not-
knowing what to expect and whether it can be solved&#8221; experience of working through an unknown trace file can be preserved.
Come to this session and learn to ask the right questions and look at packets in different ways.
PLEASE SEND PERPLEXING TRACE FILES FOR ANALYSIS BY THE PANEL TO jasper@packet-foo.com PRIOR TO SHARKFEST!</abstract>
                <slug>sharkfest-24-eu-90-the-packet-doctors-are-in-packet-trace-examinations-with-the-experts</slug>
                <track></track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-24-eu/talk/N99N8N/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-24-eu/talk/N99N8N/feedback/</feedback_url>
            </event>
            <event guid='64e023a9-0dde-58fa-a735-57b8be637d99' id='63'>
                <room>Ballroom A+B+C</room>
                <title>VXLAN, EVPN and other intricacies unpacked</title>
                <subtitle></subtitle>
                <type>Short Presentation</type>
                <date>2024-11-07T14:00:00+01:00</date>
                <start>14:00</start>
                <duration>01:00</duration>
                <abstract>This talk will focus on VXLAN and MP-BGP EVPN in datacenter environments. It will analyze some of the inner workings and interactions between all the different components using Wireshark and will hopefully provide attendees with a better understanding of how these different pieces of technology work altogether. It will also give some troubleshooting tips for VXLAN EVPN. The discussion will first cover foundational concepts (VXLAN encapsulation, EVPN route types, L3VNI/L2VNI...) and get into more advanced topics (BGP unnumbered, RTs, MLAG/MH interactions, TE).</abstract>
                <slug>sharkfest-24-eu-63-vxlan-evpn-and-other-intricacies-unpacked</slug>
                <track>Intermediate</track>
                
                <persons>
                    <person id='54'>Pierre Besombes</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-24-eu/talk/9RT9SP/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-24-eu/talk/9RT9SP/feedback/</feedback_url>
            </event>
            <event guid='03d94d9a-0667-5551-9d91-8ccfea835061' id='68'>
                <room>Ballroom A+B+C</room>
                <title>Everything is encrypted</title>
                <subtitle></subtitle>
                <type>Short Presentation</type>
                <date>2024-11-07T15:00:00+01:00</date>
                <start>15:00</start>
                <duration>01:00</duration>
                <abstract>More and more traffic is encrypted using TLS: &#8220;https is the new tcp&#8221;. What if you need to troubleshoot but can&#8217;t use decryption? Either because it is hard to do or not allowed. 
But based on traffic patterns, or meta data, it is still possible to draw conclusions. Like who is slow, how many applications turns (request/response pairs), size of the data, is the communication efficient (overhead ratio), etc..  
This session we cover the methods of analyzing using Wireshark. First part for TLS up to version 1.2. The second part using version TLS 1.3, which is much harder to do, but not impossible.</abstract>
                <slug>sharkfest-24-eu-68-everything-is-encrypted</slug>
                <track>Intermediate</track>
                
                <persons>
                    <person id='57'>Andr&#233; Luyer</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-24-eu/talk/YHDD3S/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-24-eu/talk/YHDD3S/feedback/</feedback_url>
            </event>
            <event guid='6a0dd249-a25e-5416-a190-db93cc2c0503' id='75'>
                <room>Ballroom A+B+C</room>
                <title>Network traffic @ your home</title>
                <subtitle></subtitle>
                <type>Short Presentation</type>
                <date>2024-11-07T16:15:00+01:00</date>
                <start>16:15</start>
                <duration>01:00</duration>
                <abstract>Wireshark has become an omnipresent tool in the realms of IT, OT, IoT, and cybersecurity.

Recognizing that today&apos;s higher education students rely less on textbooks and more on dynamic learning experiences, educators must adapt and develop innovative methods to effectively engage students and help them achieve their aims. 

The goal of this presentation is to flatten the learning curve of network packet analysis. By using captures within the learner&#8217;s living space, we can teach necessary skills and gain insights without much overhead. In addition, the particular communication behaviour of smart devices (lights, television, vacuum cleaner, Xbox, doorbell, pet cam, &#8230; ) is often unknown to many people.

The objective of this interactive session is to provide participants with ideas on harnessing Wireshark&apos;s capabilities for their own activities while showcasing its usage in higher education and research endeavours.</abstract>
                <slug>sharkfest-24-eu-75-network-traffic-your-home</slug>
                <track>Beginner</track>
                
                <persons>
                    <person id='65'>Ville Haapakangas</person><person id='67'>Tom Cordemans</person>
                </persons>
                <language>en</language>
                <description>This inspirational session will feature two senior lecturers from different European Universities of Applied Sciences, who will share their insights and best practices on leveraging Wireshark in both educational and research contexts.

The primary focus of this presentation is on using Wireshark correctly to become more efficient packet analyser. Drawing from our personal experiences as lecturers and researchers, we will discuss practical examples that underscore the tool&apos;s versatility and value.

This session is interactive and includes hands-on tasks with trace files. Trace files will be provided to the participants.

Some info about Ville Haapakangas:
&#8226;             Senior Lecturer at Tampere University of Applied Sciences (Tampere, Finland)
&#8226;             Lecturer in Computer Networks and Cybersecurity, several cybersecurity related research projects
&#8226;             A speaker at Sharkfest22EU and Sharkfest23EU and a participant of SharkFest EU for a few years now

Some info about Tom Cordemans:
&#8226;             Lecturer at Odisee University of Applied Sciences (Gent, Belgium)
&#8226;             ICT Technologist at DistriNet Research Unit @KU Leuven (Gent, Belgium)
&#8226;             A speaker at Sharkfest23EU and a participant of SharkFest EU for many years now.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-24-eu/talk/SZH3SB/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-24-eu/talk/SZH3SB/feedback/</feedback_url>
            </event>
            <event guid='ed501fbf-9281-52af-b1c9-5089f7d3bece' id='87'>
                <room>Ballroom A+B+C</room>
                <title>Compare the accuracy of trace files captured with a tap and Cisco ACI</title>
                <subtitle></subtitle>
                <type>Short Presentation</type>
                <date>2024-11-07T17:15:00+01:00</date>
                <start>17:15</start>
                <duration>01:00</duration>
                <abstract>in this short presentation we transfer a file and record the event with a tap and the Cisco ACI engine

Intuitively, we might configure a SPAN port because it&apos;s cheap and fast.
This presentation will explore the situation when the infrastructure or the virtual capture points are overloaded</abstract>
                <slug>sharkfest-24-eu-87-compare-the-accuracy-of-trace-files-captured-with-a-tap-and-cisco-aci</slug>
                <track>Beginner</track>
                <logo>/media/sharkfest-24-eu/submissions/J8NNR3/ACI_ZGcAqrF.png</logo>
                <persons>
                    <person id='72'>Markus Liechti</person><person id='66'>Eddi Blenkers</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-24-eu/talk/J8NNR3/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-24-eu/talk/J8NNR3/feedback/</feedback_url>
            </event>
            <event guid='6e5e5619-c07f-5a1e-af97-b22699446db7' id='57'>
                <room>Ballroom A+B+C</room>
                <title>Sponsor Technology Showcase, Packet Hero Quiz &amp; Dinner</title>
                <subtitle></subtitle>
                <type>Dinner</type>
                <date>2024-11-07T18:30:00+01:00</date>
                <start>18:30</start>
                <duration>02:30</duration>
                <abstract>Sponsor Technology Showcase &amp; Dinner</abstract>
                <slug>sharkfest-24-eu-57-sponsor-technology-showcase-packet-hero-quiz-dinner</slug>
                <track>Organization</track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-24-eu/talk/7USMUA/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-24-eu/talk/7USMUA/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Palais Sachsen Coburg I-III' guid='3e069877-dab2-577f-865c-f90071dbe9da'>
            <event guid='14f67136-1128-5cb0-b5f4-33ef1bc58346' id='59'>
                <room>Palais Sachsen Coburg I-III</room>
                <title>Unveiling Network Errors: A Deep Dive into ICMP &apos;Destination Unreachable&apos; Messages</title>
                <subtitle></subtitle>
                <type>Long Presentation</type>
                <date>2024-11-07T09:45:00+01:00</date>
                <start>09:45</start>
                <duration>01:30</duration>
                <abstract>Effective troubleshooting of network issues is a critical concern for network technicians. While many are familiar with basic ICMP tools like ping and traceroute, the breadth of ICMP capabilities often goes underutilized. This session delves into ICMP messages, specifically the &apos;Destination Unreachable&apos; type, and the insights they provide into network errors.

We will explore methods for capturing and analyzing network traffic, highlighting practical tips and tricks for using Wireshark to diagnose and resolve issues efficiently. Attendees will gain a deeper understanding of ICMP message functions and how to leverage them for improved network troubleshooting.</abstract>
                <slug>sharkfest-24-eu-59-unveiling-network-errors-a-deep-dive-into-icmp-destination-unreachable-messages</slug>
                <track>Expert / Developer</track>
                
                <persons>
                    <person id='47'>Johannes Weber</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-24-eu/talk/JZ8MZJ/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-24-eu/talk/JZ8MZJ/feedback/</feedback_url>
            </event>
            <event guid='bac3cb51-4da4-5a40-bbd3-879355c06114' id='81'>
                <room>Palais Sachsen Coburg I-III</room>
                <title>Advanced TCP Troubleshooting</title>
                <subtitle></subtitle>
                <type>Short Presentation</type>
                <date>2024-11-07T14:00:00+01:00</date>
                <start>14:00</start>
                <duration>01:00</duration>
                <abstract>Analyzing TCP connection is the most common task a network analyst has to perform. And even though tracking sequence numbers, packet loss and generally understanding the TCP handshake and teardown can be tricky as well many analysts know how to deal with those steps. But sometimes you need to analyze complex situations and figure out what is going on, for example look at packet timing or troubleshooting an issue with less than ideal capture results. In this talk we&apos;ll look at techniques that can help and of course look at some example traces.</abstract>
                <slug>sharkfest-24-eu-81-advanced-tcp-troubleshooting</slug>
                <track>Expert / Developer</track>
                
                <persons>
                    <person id='2'>Jasper Bongertz</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-24-eu/talk/WX9LX3/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-24-eu/talk/WX9LX3/feedback/</feedback_url>
            </event>
            <event guid='b4cb8a87-1c27-53ce-9f29-8a0bdaaa0483' id='84'>
                <room>Palais Sachsen Coburg I-III</room>
                <title>Dissector developer design notes</title>
                <subtitle></subtitle>
                <type>Short Presentation</type>
                <date>2024-11-07T15:00:00+01:00</date>
                <start>15:00</start>
                <duration>01:00</duration>
                <abstract>In this talk we&apos;ll go over lots of the details that dissector developers have to contend with. Not only will we touch on some of the Epan APIs available to us, but we will go beyond the API&apos;s and discuss the way of thinking about packet dissection design. Here we may discover wisdoms which are not only important to dissector developers, but for software development in general.

Even though in this talk we will focus on development of C code, Lua dissector developers may take away some deeper insights as well.</abstract>
                <slug>sharkfest-24-eu-84-dissector-developer-design-notes</slug>
                <track>Expert / Developer</track>
                
                <persons>
                    <person id='7'>Jaap Keuter</person>
                </persons>
                <language>en</language>
                <description>As a core developer I get to see a lot of dissector code, in the form of merge requests, during investigation of bugs, or written by myself. While working on this code I often come across designs which are not optimal for the purpose they serve. This may have to do with the use of poor examples, missing insight into how the packet dissection process really works or lack of understanding of the protocols at hand. Either way more knowledge and insight will hopefully help you to create better dissectors.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-24-eu/talk/N3XNY9/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-24-eu/talk/N3XNY9/feedback/</feedback_url>
            </event>
            <event guid='fd12e08d-9047-5c3f-8b08-6dc894f40f7e' id='79'>
                <room>Palais Sachsen Coburg I-III</room>
                <title>Optimizing Server Settings Using Packet Captures</title>
                <subtitle></subtitle>
                <type>Short Presentation</type>
                <date>2024-11-07T16:15:00+01:00</date>
                <start>16:15</start>
                <duration>01:00</duration>
                <abstract>This talk explores how we might use Wireshark to optimize servers and applications even when they aren&apos;t slow. Depending on the type of traffic, optimizing TCP windowing and reducing the number of round trips required to transmit information can improve the speed of an application significantly.</abstract>
                <slug>sharkfest-24-eu-79-optimizing-server-settings-using-packet-captures</slug>
                <track>Expert / Developer</track>
                
                <persons>
                    <person id='6'>Josh Clark</person>
                </persons>
                <language>en</language>
                <description>The internet operates using standards, and these standards were developed, debated, and ratified with the entirety of the internet in mind. But are these standards ideal for your environment?

The largest internet companies tune their servers to operate best in the environments they maintain. That tight control lets them reduce application response times even when latency might be high.

We will use packet captures to identify application traffic patterns and active network conditions, and we&#8217;ll explore options to customize how servers put data on the network to fit the application and the network.</description>
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-24-eu/talk/DPTKUS/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-24-eu/talk/DPTKUS/feedback/</feedback_url>
            </event>
            <event guid='bfb014ae-dce9-5d7d-8c66-bdc73ac60d4e' id='65'>
                <room>Palais Sachsen Coburg I-III</room>
                <title>Dissecting the Client Hello with Pyshark</title>
                <subtitle></subtitle>
                <type>Short Presentation</type>
                <date>2024-11-07T17:15:00+01:00</date>
                <start>17:15</start>
                <duration>01:00</duration>
                <abstract>This talk covers using Pyshark for analyzing pcap files, focusing on accessing nested elements in network packets, particularly within Client Hello packets, including encryption suites and TLS versions. This presentation provides an updated guide on effectively using Pyshark, addressing the gaps in current documentation and offering practical insights. The session will cover the basics of loading pcap files, inspecting packet types and layers, and using commands to list packet layers and extract details. It includes a practical example of extracting offered encryption suites from Client Hello packets to ensure secure encryption methods. By applying Wireshark display filters in Pyshark, the talk demonstrates how to efficiently find needed packets. Key issues and solutions when using JSON and Python objects will be highlighted, helping avoid errors and process data smoothly. Learn to effectively access and use nested elements and specific data points with Pyshark.</abstract>
                <slug>sharkfest-24-eu-65-dissecting-the-client-hello-with-pyshark</slug>
                <track>Beginner</track>
                <logo>/media/sharkfest-24-eu/submissions/GEJMM9/pyshark_GA7QOgT.jpg</logo>
                <persons>
                    <person id='36'>Katherine Leese</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-24-eu/talk/GEJMM9/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-24-eu/talk/GEJMM9/feedback/</feedback_url>
            </event>
            
        </room>
        
    </day>
    <day index='5' date='2024-11-08' start='2024-11-08T04:00:00+01:00' end='2024-11-09T03:59:00+01:00'>
        <room name='Ballroom A+B+C' guid='06852f1f-32d7-5c11-9bfd-5b214e7b2052'>
            <event guid='bed095e0-9f94-5266-be09-3dd6433301c5' id='74'>
                <room>Ballroom A+B+C</room>
                <title>SharkBytes</title>
                <subtitle></subtitle>
                <type>Organization</type>
                <date>2024-11-08T09:00:00+01:00</date>
                <start>09:00</start>
                <duration>00:45</duration>
                <abstract>Come and enjoy an interesting session with learning interesting stuff about each other!</abstract>
                <slug>sharkfest-24-eu-74-sharkbytes</slug>
                <track>Organization</track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-24-eu/talk/MLBZMC/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-24-eu/talk/MLBZMC/feedback/</feedback_url>
            </event>
            <event guid='4a7873fc-c58b-5651-a79a-67f60e9c5559' id='82'>
                <room>Ballroom A+B+C</room>
                <title>Sharksniff 3000 - the Wireless Decrypting Cyberdeck</title>
                <subtitle></subtitle>
                <type>Short Presentation</type>
                <date>2024-11-08T09:45:00+01:00</date>
                <start>09:45</start>
                <duration>01:30</duration>
                <abstract>Modern networks and devices rely heavily on two critical protocols: WiFi and TLS encryption. Many devices, such as smartphones, tablets, IoT devices, and others, lack built-in options for packet capture or the ability to obtain session keys.

My objective was to develop a device that functions as a proxy, capable of capturing traffic from wireless devices, decrypting and re-encrypting it, and outputting session keys&#8212;all while remaining invisible to the end user. The ultimate goal is to enable engineers to analyze decrypted traffic.

In this session, I&apos;ll share my motivation for building the cyberdeck, the challenges and successes I encountered, how the system works, and review traffic captures from well-known smartphone apps.</abstract>
                <slug>sharkfest-24-eu-82-sharksniff-3000-the-wireless-decrypting-cyberdeck</slug>
                <track>Intermediate</track>
                
                <persons>
                    <person id='9'>Ross Bagurdes</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-24-eu/talk/RVUPLY/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-24-eu/talk/RVUPLY/feedback/</feedback_url>
            </event>
            <event guid='bcacc86e-a1cf-5ff6-a990-da25352c3704' id='83'>
                <room>Ballroom A+B+C</room>
                <title>Cloud doesn&#8217;t have Packets!</title>
                <subtitle></subtitle>
                <type>Short Presentation</type>
                <date>2024-11-08T11:30:00+01:00</date>
                <start>11:30</start>
                <duration>01:00</duration>
                <abstract>It&#8217;s easy to laugh at the apocryphal executive quote &#8220;Cloud doesn&#8217;t have Packets!&#8221;, but is there something more to it? What might they have meant?
 
What are the differences between traditional On-premise and Cloud networking and architectures, and what does this tell us about attitudes towards network based security and trouble-shooting?
 
In this talk we will look at how Cloud differs from On-prem networking, what common Cloud architectures look like, and how they can confound established practice. We will review options for Packet Capture and network based tools in Cloud compared to On-prem environments, and discuss whether it is practical, beneficial, and necessary.</abstract>
                <slug>sharkfest-24-eu-83-cloud-doesn-t-have-packets</slug>
                <track>Beginner</track>
                
                <persons>
                    <person id='31'>Stephen Donnelly</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-24-eu/talk/TPT9PT/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-24-eu/talk/TPT9PT/feedback/</feedback_url>
            </event>
            <event guid='c5e65c77-6652-5998-ae37-e5da39916de8' id='56'>
                <room>Ballroom A+B+C</room>
                <title>Lunch, Closing Remarks and Farewell Reception</title>
                <subtitle></subtitle>
                <type>Long Presentation</type>
                <date>2024-11-08T12:30:00+01:00</date>
                <start>12:30</start>
                <duration>01:30</duration>
                <abstract>Closing Remarks and Farewell reception</abstract>
                <slug>sharkfest-24-eu-56-lunch-closing-remarks-and-farewell-reception</slug>
                <track>Organization</track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-24-eu/talk/GUGZZQ/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-24-eu/talk/GUGZZQ/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Palais Sachsen Coburg I-III' guid='3e069877-dab2-577f-865c-f90071dbe9da'>
            <event guid='ad46a388-9b99-5b99-af20-fa2f056bceae' id='91'>
                <room>Palais Sachsen Coburg I-III</room>
                <title>Gotta catch &apos;em all! A field test of portable gigabit taps</title>
                <subtitle></subtitle>
                <type>Short Presentation</type>
                <date>2024-11-08T11:30:00+01:00</date>
                <start>11:30</start>
                <duration>01:00</duration>
                <abstract>Capturing packets on the road can be a challenge. Do you have access to the switch? Are you able to install Wireshark on the endpoints. What if one side says it sends packets, but the other side does not receive them. There are many situations in which a tap might be handy or needed to make a useful packet capture. In those cases, having a portable tap in your laptop bag is a life-saver.

There are a few portable USB powered gigabit Ethernet taps on the market that have different capabilities. I made an overview of available portable taps and reached out to vendors to supply me one for a thorough test. This presentation gives an overview of the portable gigabit taps on the market, their capabilities and how well they performed on the test-bench.</abstract>
                <slug>sharkfest-24-eu-91-gotta-catch-em-all-a-field-test-of-portable-gigabit-taps</slug>
                <track>Beginner</track>
                
                <persons>
                    <person id='10'>Sake Blok</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-24-eu/talk/VBHSF3/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-24-eu/talk/VBHSF3/feedback/</feedback_url>
            </event>
            
        </room>
        
    </day>
    
</schedule>
