Ross Bagurdes
Ross has had a diverse career in engineering, beginning as a structural engineer, then project engineer for a gas utility, Ross was always quickly
assigned the de-facto network administrator, typically after no one else was brave enough to break, and later fix, the network. This lead to working as a network engineer designing and implementing enterprise networks for a major university hospital. Here he worked with
Extreme Networks, HP, Cisco, Tipping Point, among other network technology, as well as honed his Wireshark and protocol analysis skills. Ross
spent 7 years teaching data networking at Madison College, and in 2017 started authoring and producing IT training videos in Wireshark/Protocol
Analysis, Cisco, and general networking topics for www.Pluralsight.com. In his free time, you'll find Ross and his dog at the beach swimming and
surfing, traveling, hiking, or snowboarding somewhere in the western US.
Sessions
Wireshark can be intimidating.
We remember how it felt when we first started looking at a trace file with Wireshark. Questions started flooding into our minds:
What should I look for?
Where do I start?
How can I find the packets that matter?
What filters should I use?
What is "normal" and what can I ignore in all this data?
I froze under the weight of all the detail in the packets. If you have ever felt that way when looking at a pcap, this is the course for you!
Wireshark can be intimidating.
We remember how it felt when we first started looking at a trace file with Wireshark. Questions started flooding into our minds:
What should I look for?
Where do I start?
How can I find the packets that matter?
What filters should I use?
What is "normal" and what can I ignore in all this data?
I froze under the weight of all the detail in the packets. If you have ever felt that way when looking at a pcap, this is the course for you!
Ever struggled with capturing traffic from your mobile device or felt stumped by encrypted applications? Dive into this comprehensive session to build your very own wired or wireless traffic sniffer using a Raspberry Pi.
In this engaging workshop, you'll explore:
• Selecting the ideal Raspberry Pi hardware and components.
• Choosing the best Raspbian OS versions.
• Building proper interface and routing configurations.
• Setting up a wireless AP.
• Generating and installing certificates.
• Setting up a TLS proxy to export session keys.
• Connecting devices to capture their traffic.
• Limitations of the device and configuration.
• Addressing critical security and privacy considerations associated with the device.
Walk away with the confidence and knowledge to construct a wireless capture device, granting you the power to decrypt and troubleshoot applications with ease(results may vary)
The experts on this panel have been asked to look at a trace file and help find a reason for certain behaviors by attendees at many SharkFests. Based on this, they’ve decided to create a public forum for examining individual trace files with a broader audience for a collective learning experience. Trace files will be gathered from attendees prior to SharkFest and only given to the panel members during the session so that the “not-knowing what to expect and whether it can be solved” experience of working through an unknown trace file can be preserved.
Come to this session and learn to ask the right questions and look at packets in different ways.
PLEASE SEND PERPLEXING TRACE FILES FOR ANALYSIS BY THE PANEL TO [email protected] PRIOR TO SHARKFEST!