<?xml version='1.0' encoding='utf-8' ?>
<!-- Made with love by pretalx v2025.2.2. -->
<schedule>
    <generator name="pretalx" version="2025.2.2" />
    <version>0.39</version>
    <conference>
        <title>SharkFest&apos;25 EUROPE</title>
        <acronym>sharkfest-25-europe-2025</acronym>
        <start>2025-11-03</start>
        <end>2025-11-07</end>
        <days>5</days>
        <timeslot_duration>00:05</timeslot_duration>
        <base_url>https://conference.wireshark.org</base_url>
        
        <time_zone_name>Europe/Warsaw</time_zone_name>
        
        
        <track name="Beginner" slug="23-beginner"  color="#00ab9b" />
        
        <track name="Intermediate" slug="24-intermediate"  color="#2b9ecf" />
        
        <track name="Expert / Developer" slug="25-expert-developer"  color="#9d6dec" />
        
        <track name="Security" slug="26-security"  color="#72b406" />
        
        <track name="A.I." slug="27-ai"  color="#e60757" />
        
        <track name="Pre-conference class" slug="28-pre-conference-class"  color="#0c590d" />
        
        <track name="Organization" slug="29-organization"  color="#3c8bc4" />
        
    </conference>
    <day index='1' date='2025-11-03' start='2025-11-03T04:00:00+01:00' end='2025-11-04T03:59:00+01:00'>
        <room name='Grand Ballroom Salons AB' guid='253b4214-1e2a-5850-949c-0b8a9292b758'>
            <event guid='0dbfcb98-d989-5eaa-9cdb-882ebed86fe2' id='137'>
                <room>Grand Ballroom Salons AB</room>
                <title>Pre-conference class I: Essential Wireshark Skills: Practical Packet Analysis (2-day class)</title>
                <subtitle></subtitle>
                <type>Pre Conference Class</type>
                <date>2025-11-03T09:00:00+01:00</date>
                <start>09:00</start>
                <duration>08:00</duration>
                <abstract>Level up your Wireshark skills and get ready for Sharkfest! This hands-on course will provide core Wireshark skills for IT pros of all experience levels. Participants will gain a solid understanding of how to use Wireshark to capture, analyze, and troubleshoot network traffic. The course is designed with beginners in mind, but even seasoned packet people will pick up new tips and tricks.</abstract>
                <slug>sharkfest-25-europe-2025-137-0-pre-conference-class-i-essential-wireshark-skills-practical-packet-analysis-2-day-class</slug>
                <track>Pre-conference class</track>
                
                <persons>
                    <person id='9'>Ross Bagurdes</person>
                </persons>
                <language>en</language>
                <description>Topics Covered:

Introduction to network analysis and the role of Wireshark
Installing and configuring Wireshark
Analyzing captured packets, understanding protocol structures, and identifying network issues
Utilizing powerful filtering techniques to isolate specific traffic and find the packets that matter
Deep Dive into ARP, IP, ICMP, DNS, DHCP, TCP, UDP, QUIC, HTTP, TLS, and much more!
Working with command-line tools like TShark</description>
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/RKPHN8/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/RKPHN8/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Grand Ballroom Salons CDE' guid='d89863ae-3316-5419-babb-84355d4133c9'>
            <event guid='5ca4be84-2f32-5967-8c6c-889fa4f652e7' id='145'>
                <room>Grand Ballroom Salons CDE</room>
                <title>Pre-conference class II: TCP Analysis Masterclass</title>
                <subtitle></subtitle>
                <type>Pre Conference Class</type>
                <date>2025-11-03T09:00:00+01:00</date>
                <start>09:00</start>
                <duration>08:00</duration>
                <abstract>Analyzing TCP connections is one of the biggest topics in network analysis in general, especially when troubleshooting applications or even multi-tiered deployments of servers. How TCP works and detecting problems is one of the &apos;easy to learn, hard to master&apos; skills that is always in demand. Most Wireshark classes only touch the basics and do not go into the more complex scenarios, especially when it comes to multi point captures to track packet loss and timing issues. In this masterclass you will learn how to troubleshoot TCP in seemingly simple as well as complex and quite challenging cases.</abstract>
                <slug>sharkfest-25-europe-2025-145-pre-conference-class-ii-tcp-analysis-masterclass</slug>
                <track>Pre-conference class</track>
                
                <persons>
                    <person id='2'>Jasper Bongertz</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/D8UHZY/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/D8UHZY/feedback/</feedback_url>
            </event>
            
        </room>
        
    </day>
    <day index='2' date='2025-11-04' start='2025-11-04T04:00:00+01:00' end='2025-11-05T03:59:00+01:00'>
        <room name='Grand Ballroom Salons AB' guid='253b4214-1e2a-5850-949c-0b8a9292b758'>
            <event guid='76ea347d-4205-565a-bdf1-1f49cd19de59' id='137'>
                <room>Grand Ballroom Salons AB</room>
                <title>Pre-conference class I: Essential Wireshark Skills: Practical Packet Analysis (2-day class)</title>
                <subtitle></subtitle>
                <type>Pre Conference Class</type>
                <date>2025-11-04T09:00:00+01:00</date>
                <start>09:00</start>
                <duration>08:00</duration>
                <abstract>Level up your Wireshark skills and get ready for Sharkfest! This hands-on course will provide core Wireshark skills for IT pros of all experience levels. Participants will gain a solid understanding of how to use Wireshark to capture, analyze, and troubleshoot network traffic. The course is designed with beginners in mind, but even seasoned packet people will pick up new tips and tricks.</abstract>
                <slug>sharkfest-25-europe-2025-137-1-pre-conference-class-i-essential-wireshark-skills-practical-packet-analysis-2-day-class</slug>
                <track>Pre-conference class</track>
                
                <persons>
                    <person id='9'>Ross Bagurdes</person>
                </persons>
                <language>en</language>
                <description>Topics Covered:

Introduction to network analysis and the role of Wireshark
Installing and configuring Wireshark
Analyzing captured packets, understanding protocol structures, and identifying network issues
Utilizing powerful filtering techniques to isolate specific traffic and find the packets that matter
Deep Dive into ARP, IP, ICMP, DNS, DHCP, TCP, UDP, QUIC, HTTP, TLS, and much more!
Working with command-line tools like TShark</description>
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/RKPHN8/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/RKPHN8/feedback/</feedback_url>
            </event>
            <event guid='53a7c40b-f807-5598-85f2-6c58737e43ec' id='138'>
                <room>Grand Ballroom Salons AB</room>
                <title>SharkFest&apos;25 EUROPE Welcome Dinner &amp; Sponsor Showcase</title>
                <subtitle></subtitle>
                <type>Dinner</type>
                <date>2025-11-04T17:30:00+01:00</date>
                <start>17:30</start>
                <duration>03:00</duration>
                <abstract>Let&apos;s kick-off the conference in style!</abstract>
                <slug>sharkfest-25-europe-2025-138-sharkfest-25-europe-welcome-dinner-sponsor-showcase</slug>
                <track>Organization</track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                <description>SharkFest&apos;25 EUROPE Welcome Dinner &amp; Sponsor Showcase</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/VENMYF/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/VENMYF/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Grand Ballroom Salons CDE' guid='d89863ae-3316-5419-babb-84355d4133c9'>
            <event guid='708e3b83-96d5-5afa-bca2-395ba7838712' id='146'>
                <room>Grand Ballroom Salons CDE</room>
                <title>Pre-conference class III: SMB Masterclass // Starting at 08:30</title>
                <subtitle></subtitle>
                <type>Pre Conference Class</type>
                <date>2025-11-04T08:30:00+01:00</date>
                <start>08:30</start>
                <duration>09:00</duration>
                <abstract>SMB is the bread and butter protocol used to access file shares in virtually every company and home network. Since Windows Vista / Server 2008, the &quot;classic&quot; SMB has been replaced by SMB2 and later SMB3. Since legacy systems running Windows XP / Server 2003 are increasingly rare, we focus on the newer version.

This class will enable students to investigate functional issues and performance problems. Topics covered are

* SMB Handshake, selection of a dialect version and user authentication

* General process of mounting a share and accessing files

* Tracking SMB sessions over multiple interfaces or IP-addresses

* SMB functions beyond file sharing (IPC, Named Pipes)

* Investigating error codes

* Decryption of SMB traffic (not for the faint-hearted)

* Understanding the service response time feature for SMB

* identification of performance bottlenecks in the network, application logic, client or server</abstract>
                <slug>sharkfest-25-europe-2025-146-pre-conference-class-iii-smb-masterclass-starting-at-08-30</slug>
                <track>Pre-conference class</track>
                
                <persons>
                    <person id='66'>Eddi Blenkers</person>
                </persons>
                <language>en</language>
                <description>Please note that class will start at 08:30 and end at 17:30.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/MF8XDP/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/MF8XDP/feedback/</feedback_url>
            </event>
            
        </room>
        
    </day>
    <day index='3' date='2025-11-05' start='2025-11-05T04:00:00+01:00' end='2025-11-06T03:59:00+01:00'>
        <room name='Grand Ballroom Salons AB' guid='253b4214-1e2a-5850-949c-0b8a9292b758'>
            <event guid='18a778a7-3735-5660-95c9-e22665ae7df1' id='142'>
                <room>Grand Ballroom Salons AB</room>
                <title>Keynote: What&apos;s New in Wireshark 4.6?</title>
                <subtitle></subtitle>
                <type>Organization</type>
                <date>2025-11-05T09:00:00+01:00</date>
                <start>09:00</start>
                <duration>01:00</duration>
                <abstract>Gerald Combs &amp; Friends talk about the new developments over the past year</abstract>
                <slug>sharkfest-25-europe-2025-142-keynote-what-s-new-in-wireshark-4-6</slug>
                <track>Organization</track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/ULU3WK/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/ULU3WK/feedback/</feedback_url>
            </event>
            <event guid='23935dd3-6496-5387-98ab-4b71e16fd51f' id='170'>
                <room>Grand Ballroom Salons AB</room>
                <title>Introduction to Cloud Packet Capture</title>
                <subtitle></subtitle>
                <type>Presentation</type>
                <date>2025-11-05T10:15:00+01:00</date>
                <start>10:15</start>
                <duration>01:00</duration>
                <abstract>Cloud computing is often described in a very abstract way, but in reality relies on the same networking technologies and protocols we use every day. How can we get visibility into Cloud networks to troubleshoot and secure them?

What are the differences between traditional On-premise and Cloud networking and architectures, and what does this tell us about attitudes towards network based security and trouble-shooting?
 
In this talk we will look at Cloud networking from the user perspective, and what some common Cloud architectures look like. We will review options for Packet Capture and network based tools in Cloud compared to On-prem environments, and discuss whether it is practical, beneficial, and necessary.</abstract>
                <slug>sharkfest-25-europe-2025-170-introduction-to-cloud-packet-capture</slug>
                <track>Beginner</track>
                
                <persons>
                    <person id='31'>Stephen Donnelly</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/QGAT79/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/QGAT79/feedback/</feedback_url>
            </event>
            <event guid='78c12141-c138-5b52-a072-cd87a7aa29d4' id='119'>
                <room>Grand Ballroom Salons AB</room>
                <title>Wireless with Wireshark</title>
                <subtitle></subtitle>
                <type>Presentation</type>
                <date>2025-11-05T11:30:00+01:00</date>
                <start>11:30</start>
                <duration>01:00</duration>
                <abstract>Scanning wireless to find devices with Wireshark</abstract>
                <slug>sharkfest-25-europe-2025-119-wireless-with-wireshark</slug>
                <track>Intermediate</track>
                
                <persons>
                    <person id='12'>Megumi Takeshita</person>
                </persons>
                <language>en</language>
                <description>Wireshark is a tool for analyzing both wireless and wired networks. In this session, Megumi will show you how to find devices on your wireless network. With various scanning tools, we can explore different standards of WiFi networks and Bluetooth using Wireshark. Additionally, tshark and other Wireshark command-line interface (CLI) tools are useful for collecting and summarize device information. Use Wireshark to manage your wireless environment and enhance your wireless security!!</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/87EHWR/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/87EHWR/feedback/</feedback_url>
            </event>
            <event guid='c02e1e81-1f82-5ff2-bffc-e6f4323c7c1f' id='178'>
                <room>Grand Ballroom Salons AB</room>
                <title>Bridging the IT/OT Divide: Analyzing Operational Technology Networks with Wireshark</title>
                <subtitle></subtitle>
                <type>Presentation</type>
                <date>2025-11-05T13:30:00+01:00</date>
                <start>13:30</start>
                <duration>01:00</duration>
                <abstract>Modern industrial networks pose unique challenges for packet analysis. This talk will introduce Wireshark users to the world of Operational Technology (OT) networks &#8211; the networks that control physical equipment in factories, power plants, and critical infrastructure &#8211; and explain how they differ from traditional Information Technology (IT) networks. We will explore how OT networks prioritize deterministic, time-critical communication in a way that IT networks do not, and why capturing and analyzing packets in OT environments is often more challenging. Attendees will learn about the distinct network architectures and protocols used in OT (from fieldbus and PLC communications to SCADA systems), and how factors like cycle times and real-time scheduling shape traffic patterns. We&#8217;ll discuss why OT traffic tends to be highly regular and cyclic (enabling whitelisting of expected flows) in contrast to the bursty, ad-hoc traffic of IT networks &#65532;. The talk will also highlight security implicat</abstract>
                <slug>sharkfest-25-europe-2025-178-bridging-the-it-ot-divide-analyzing-operational-technology-networks-with-wireshark</slug>
                <track>Beginner</track>
                
                <persons>
                    <person id='1'>Roland Knall</person>
                </persons>
                <language>en</language>
                <description>Key Takeaways:
	&#8226;	Fundamental differences in purpose and design between IT and OT networks (priorities of safety/up-time vs. data-centric goals &#65532;).
	&#8226;	How OT network traffic is deterministic and cycle-driven rather than ad-hoc, with strict timing requirements &#65532; &#65532;.
	&#8226;	Awareness of legacy systems and security challenges in OT (long device lifecycles, rare patches, focus on network segregation over frequent updates &#65532; &#65532;).
	&#8226;	Practical tips for using Wireshark on OT protocols, including recognizing industrial protocol traffic and analyzing communication patterns over time.
	&#8226;	Examples of diagnosing OT network issues by examining packet timing and sequence instead of just packet content.

By the end of this talk, attendees will have a clear understanding of what makes packet capture and analysis in OT environments unique, and how to leverage Wireshark to troubleshoot and monitor industrial network traffic effectively. Expect to gain insight into a fascinating area where networking meets the physical world, and pick up tips that you can apply when you encounter OT protocols in the wild.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/EUDWFA/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/EUDWFA/feedback/</feedback_url>
            </event>
            <event guid='13c0cd2c-9bc9-59cb-8de4-8a41566fd867' id='168'>
                <room>Grand Ballroom Salons AB</room>
                <title>Let&apos;s use wireshark to better understand Kubernetes</title>
                <subtitle></subtitle>
                <type>Presentation</type>
                <date>2025-11-05T14:45:00+01:00</date>
                <start>14:45</start>
                <duration>01:00</duration>
                <abstract>In this talk we will get an overview of networking setup in Kubernetes on the example of Openshift. 
We will also see how application traffic can be captured and analysed.</abstract>
                <slug>sharkfest-25-europe-2025-168-let-s-use-wireshark-to-better-understand-kubernetes</slug>
                <track>Intermediate</track>
                
                <persons>
                    <person id='126'>Sergey Guzenkov</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/P3EFQN/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/P3EFQN/feedback/</feedback_url>
            </event>
            <event guid='9987a23d-724f-59a6-ad17-be068e44e895' id='160'>
                <room>Grand Ballroom Salons AB</room>
                <title>From Full Capture to Criminal Evidence: A Real-World Case of Lawful Interception</title>
                <subtitle></subtitle>
                <type>Presentation</type>
                <date>2025-11-05T16:00:00+01:00</date>
                <start>16:00</start>
                <duration>01:00</duration>
                <abstract>You&#8217;ve  wiretapped a suspect&#8217;s internet connection. You have the entire packet capture &#8212; but not a single clue about what&#8217;s relevant, or even what you&#8217;re trying to find.

In this session, we walk through a real-life criminal investigation involving the forensic analysis of a standard residential internet connection. The task: uncover evidence of illegal online activity, without prior knowledge of the services used, IP addresses involved, or even the nature of the communication.

Using only Wireshark and patience, the investigator faced hundreds of thousands of packets, countless domains, and protocols ranging from common to obscure. There were no predefined indicators of suspicious communication&#8212;just raw traffic and a hunch that something was hidden within.

This talk will demonstrate how targeted filtering, temporal analysis, and a dose of good old-fashioned intuition led to the successful identification of suspicious communication. Starting with nothing but a massive stream of packet</abstract>
                <slug>sharkfest-25-europe-2025-160-from-full-capture-to-criminal-evidence-a-real-world-case-of-lawful-interception</slug>
                <track>Intermediate</track>
                
                <persons>
                    <person id='110'>Daniel Spiekermann</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/3SQLN9/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/3SQLN9/feedback/</feedback_url>
            </event>
            <event guid='f996750a-8151-5f3f-85e5-4a715e43d3a7' id='157'>
                <room>Grand Ballroom Salons AB</room>
                <title>Level up your MPLS skills - A Wireshark-driven approach</title>
                <subtitle></subtitle>
                <type>Presentation</type>
                <date>2025-11-05T17:15:00+01:00</date>
                <start>17:15</start>
                <duration>01:00</duration>
                <abstract>This session offers a practical, Wireshark-driven approach to understanding and troubleshooting MPLS. The goal is to articulate the control plane and data plane&apos;s inner workings through packet analysis. We&apos;ll deep-dive into packet structures, label exchange mechanisms, and eventually explore some traffic engineering scenarios. This session begins with a quick review of MPLS fundamentals, then dives into real-world use cases and potentially explores related technologies and advancements like SR-MPLS.</abstract>
                <slug>sharkfest-25-europe-2025-157-level-up-your-mpls-skills-a-wireshark-driven-approach</slug>
                <track>Intermediate</track>
                
                <persons>
                    <person id='54'>Pierre Besombes</person><person id='56'>Juan Pablo Azar Ricciardi</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/K3QZUJ/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/K3QZUJ/feedback/</feedback_url>
            </event>
            <event guid='9b3bc0c1-d043-5ed8-9f0a-7e21f07e061b' id='139'>
                <room>Grand Ballroom Salons AB</room>
                <title>Sponsor Technology Showcase Reception &amp; Dinner</title>
                <subtitle></subtitle>
                <type>Dinner</type>
                <date>2025-11-05T18:30:00+01:00</date>
                <start>18:30</start>
                <duration>03:00</duration>
                <abstract>Join us for a fun night with an opportunity to enjoy wonderful conversations and win some nice prizes!</abstract>
                <slug>sharkfest-25-europe-2025-139-sponsor-technology-showcase-reception-dinner</slug>
                <track>Organization</track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/ANX98U/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/ANX98U/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Grand Ballroom Salons CDE' guid='d89863ae-3316-5419-babb-84355d4133c9'>
            <event guid='b3db86f0-75c6-593f-8a85-14cf9c76d4b0' id='132'>
                <room>Grand Ballroom Salons CDE</room>
                <title>Packet Stories</title>
                <subtitle></subtitle>
                <type>Presentation</type>
                <date>2025-11-05T10:15:00+01:00</date>
                <start>10:15</start>
                <duration>01:00</duration>
                <abstract>_To be the network or not to be the network, that&apos;s the question!_

This is a question we face a lot. The network is blamed by default, but is it really the network. During this session a couple of real life cases will be presented. What was the problem, how was it analyzed, what can we learn about the process and off course the answer to the question: was it the network?</abstract>
                <slug>sharkfest-25-europe-2025-132-packet-stories</slug>
                <track>Expert / Developer</track>
                
                <persons>
                    <person id='10'>Sake Blok</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/HUB3MR/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/HUB3MR/feedback/</feedback_url>
            </event>
            <event guid='4b7e3878-ca1c-50be-8dc4-eab2afa72a12' id='161'>
                <room>Grand Ballroom Salons CDE</room>
                <title>Secure DNS: Attacks and Defenses</title>
                <subtitle></subtitle>
                <type>Presentation</type>
                <date>2025-11-05T11:30:00+01:00</date>
                <start>11:30</start>
                <duration>01:00</duration>
                <abstract>DNS is a foundational part of the Internet - but also a prime target for attackers. In this talk, we dive into common DNS attack vectors like spoofing, command-and-control traffic via DNS, or DNS tunnelling. We&apos;ll explore modern defence mechanisms such as DNSSEC, DNS-over-HTTPS (DoH), and DNS-over-TLS (DoT), and how they help protect DNS integrity and privacy. You&apos;ll also get insights into leveraging threat intel and malware feeds to detect malicious domains, plus a look at useful tools for DNS troubleshooting and analysis.</abstract>
                <slug>sharkfest-25-europe-2025-161-secure-dns-attacks-and-defenses</slug>
                <track>Security</track>
                
                <persons>
                    <person id='47'>Johannes Weber</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/8UKP7Z/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/8UKP7Z/feedback/</feedback_url>
            </event>
            <event guid='86646720-aaf9-5a5b-930c-6fa4ab01bbf1' id='163'>
                <room>Grand Ballroom Salons CDE</room>
                <title>Talk with Your Packets: AI-Powered Natural Language Interaction with Packet Captures (part 1)</title>
                <subtitle></subtitle>
                <type>Presentation</type>
                <date>2025-11-05T13:30:00+01:00</date>
                <start>13:30</start>
                <duration>01:00</duration>
                <abstract>Unlock a groundbreaking approach to packet analysis with &quot;Talk with Your Packets,&quot; where cutting-edge AI and Large Language Models (LLMs) meet the world of .pcap and .pcapng files. This session explores how natural language, combined with artificial intelligence and a Retrieval Augmented Generation (RAG) pipeline, can transform traditional packet analysis.

We&#8217;ll dive into how packets are converted into JSON representations via the CLI, chunked for efficient processing, embedded as vectors, and stored in ChromaDB for retrieval. Democratizing access to advanced packet analysis and making it easier for users to ask meaningful questions about their packet captures.

While this solution augments Wireshark by aiding in the filtering and crafting of high-value .pcaps (garbage in, garbage out), it does not replace Wireshark. Instead, it empowers analysts with a more intuitive and streamlined way to interpret packet data.</abstract>
                <slug>sharkfest-25-europe-2025-163-talk-with-your-packets-ai-powered-natural-language-interaction-with-packet-captures-part-1</slug>
                <track>Expert / Developer</track>
                
                <persons>
                    <person id='87'>John Capobianco</person>
                </persons>
                <language>en</language>
                <description>This will be a mix of slides and live demonstrations as well as Q&amp;A and interactivity with the audience</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/HW7QGN/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/HW7QGN/feedback/</feedback_url>
            </event>
            <event guid='8cf202c6-a757-5bb7-afe5-67a32a1aae73' id='164'>
                <room>Grand Ballroom Salons CDE</room>
                <title>Talk with Your Packets: AI-Powered Natural Language Interaction with Packet Captures (part 2, Lab)</title>
                <subtitle></subtitle>
                <type>Workshop</type>
                <date>2025-11-05T14:45:00+01:00</date>
                <start>14:45</start>
                <duration>02:15</duration>
                <abstract>A hands on lab that goes with the lecture. People will be using AI and NL to &apos;talk to their packets&apos; 

2 hour lab</abstract>
                <slug>sharkfest-25-europe-2025-164-talk-with-your-packets-ai-powered-natural-language-interaction-with-packet-captures-part-2-lab</slug>
                <track>Expert / Developer</track>
                
                <persons>
                    <person id='87'>John Capobianco</person>
                </persons>
                <language>en</language>
                <description>A hands on lab that goes with the lecture. People will be using AI and NL to &apos;talk to their packets&apos; 

2 hour lab</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/B3QNQ7/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/B3QNQ7/feedback/</feedback_url>
            </event>
            <event guid='769e6bef-e359-5658-b795-86ef1570e6ef' id='174'>
                <room>Grand Ballroom Salons CDE</room>
                <title>LTE / 5G packet flow explained</title>
                <subtitle></subtitle>
                <type>Presentation</type>
                <date>2025-11-05T17:15:00+01:00</date>
                <start>17:15</start>
                <duration>01:00</duration>
                <abstract>We&apos;ll walk through packets captured from a cell phone acquiring a tower, and follow the packet all the way out to the internet. Show filters used when troubleshooting 4G/5G, as well as some real world problems.</abstract>
                <slug>sharkfest-25-europe-2025-174-lte-5g-packet-flow-explained</slug>
                <track>Intermediate</track>
                
                <persons>
                    <person id='17'>Mark Stout</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/7YAQ3C/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/7YAQ3C/feedback/</feedback_url>
            </event>
            
        </room>
        
    </day>
    <day index='4' date='2025-11-06' start='2025-11-06T04:00:00+01:00' end='2025-11-07T03:59:00+01:00'>
        <room name='Grand Ballroom Salons AB' guid='253b4214-1e2a-5850-949c-0b8a9292b758'>
            <event guid='ac787f54-85b7-5215-a0a3-18c9e4d6fb7f' id='128'>
                <room>Grand Ballroom Salons AB</room>
                <title>Keynote: Shift the Conversation: Open Source is Free, But Not Free-Free</title>
                <subtitle></subtitle>
                <type>Presentation</type>
                <date>2025-11-06T09:00:00+01:00</date>
                <start>09:00</start>
                <duration>00:45</duration>
                <abstract>Open-source software is everywhere&#8212;from network security tools like Wireshark and Suricata to the critical infrastructure enterprises rely on daily. Yet, when OSS enters the corporate conversation, it&#8217;s often met with &quot;Isn&#8217;t it free? Why should we invest in it?&quot; or &#8220;Won&#8217;t the community just take care of everything.&#8221; or &quot;Who&#8217;s responsible if something goes wrong?&quot; Instead of treating OSS as a strategic asset, these misconceptions create barriers to security, sustainability, and innovation.

This session will help you shift the OSS conversation&#8212;moving from passive consumption to active engagement. Drawing from real-world experience leading OISF (Suricata), we&#8217;ll explore how to make the business case for OSS, advocate for responsible adoption, and integrate due diligence into enterprise processes. Attendees will leave with strategies to foster internal support and transform OSS from an afterthought into a competitive advantage.</abstract>
                <slug>sharkfest-25-europe-2025-128-keynote-shift-the-conversation-open-source-is-free-but-not-free-free</slug>
                <track>Intermediate</track>
                
                <persons>
                    <person id='100'>Kelley Misata</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/VPBRDM/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/VPBRDM/feedback/</feedback_url>
            </event>
            <event guid='d35ddc93-daa3-59b1-a17b-aa4d1c6f64db' id='131'>
                <room>Grand Ballroom Salons AB</room>
                <title>New kid on the block: Stratoshark</title>
                <subtitle></subtitle>
                <type>Presentation</type>
                <date>2025-11-06T10:15:00+01:00</date>
                <start>10:15</start>
                <duration>01:00</duration>
                <abstract>Gerald has been working on a new tool that has just been released to the public: Stratoshark. It has the same look and feel of Wireshark (as it shares quite a bit of common code), but you can analyze (linux) system calls and (cloud) logs with it.

As per www.stratoshark.org:
_Stratoshark lets you explore and investigate the application-level behavior of your systems. You can capture system call and log activity and use a variety of advanced features to troubleshoot and analyze that activity. If you&apos;ve ever used Wireshark, Stratoshark will look very familiar! It&apos;s a sibling application that shares the same dissection and filtering engine and much of the same user interface. It supports the same file format as Falco and Sysdig CLI, which lets you pivot seamlessly between each tool. As an added bonus, it&apos;s open source, just like Wireshark and Falco._

This talk will give you an introduction to Stratoshark and some hints to get started your Stratoshark journey.</abstract>
                <slug>sharkfest-25-europe-2025-131-new-kid-on-the-block-stratoshark</slug>
                <track>Intermediate</track>
                
                <persons>
                    <person id='10'>Sake Blok</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/NMUBR7/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/NMUBR7/feedback/</feedback_url>
            </event>
            <event guid='623af515-5019-505b-b948-5d13f2b7ab5f' id='158'>
                <room>Grand Ballroom Salons AB</room>
                <title>Making WebRTC work in times of locked down networks  - A hands-on session on how to find out what your favorite Web Conferencing tool really needs</title>
                <subtitle></subtitle>
                <type>Presentation</type>
                <date>2025-11-06T11:30:00+01:00</date>
                <start>11:30</start>
                <duration>01:00</duration>
                <abstract>According to their documentation, modern WebRTC based conferencing solutions require literally thousands of open ports to hundreds of thousands IP addresses to play.
How come they still work in todays super restrictive  corporate networks - when they were conceived at a time were the Internet was still an idyllic place and a firewall just a clean cut packet filter.
And how you can fix them, in case they don&apos;t cooperate
I invite you to my journey of finding this out and I&apos;ll show you my implements ;-)</abstract>
                <slug>sharkfest-25-europe-2025-158-making-webrtc-work-in-times-of-locked-down-networks-a-hands-on-session-on-how-to-find-out-what-your-favorite-web-conferencing-tool-really-needs</slug>
                <track>Intermediate</track>
                
                <persons>
                    <person id='44'>Robert Hess</person>
                </persons>
                <language>en</language>
                <description>**We will look at the big players**
	&#8226; Zoom Web
	&#8226; Teams
	&#8226; Google Meet
	&#8226; Webex
	&#8226;  GotoWebinar (not big, but what my company does)

What do the specs say wrt IPS/Ports/Domains ?
What is the (tested) minimum ?

**How do we find out what network requirements they really have?**
	&#8226; Run Wireshark capture in unrestricted network to get a first idea
	&#8226; Have browser export TLS keys so you can read the setup messages
	&#8226; Step by step restrict protocols, address ranges, domains to see what still works.
	&#8226; Live demonstration of test setup

**Short sidenote:** How WebRTC finds connections - diagrams of the different configurations

**Tests**
How do they deal with
	&#8226; Explicit Proxies (SNI)
	&#8226; No local DNS / DNS sinkholes
	&#8226; DPI (Fallback from QUIC to force proxies)
	&#8226; Zscaler connections (split routing)
	&#8226; Non corporate VPN solutions (wireguard based)
	&#8226; How many connections are used in total
	&#8226; IP ranges/domains used

**What to do if things fail**
common workarounds
	&#8226; WebRTC fallbacks
	&#8226; Exclude Signaling from DPI
	&#8226; Open UDP 
	&#8226; TURN server to rescue
	&#8226; Faking DNS</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/8N8MES/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/8N8MES/feedback/</feedback_url>
            </event>
            <event guid='e25f5f0b-4f31-59e9-b964-474414b7f769' id='143'>
                <room>Grand Ballroom Salons AB</room>
                <title>The Packet Doctors are in! Packet trace examinations with the experts</title>
                <subtitle></subtitle>
                <type>Packetdoctors Session</type>
                <date>2025-11-06T13:30:00+01:00</date>
                <start>13:30</start>
                <duration>01:30</duration>
                <abstract>The experts on this panel have been asked to look at a trace file and help find a reason for certain behaviors by attendees at many SharkFests. Based on this, they&#8217;ve decided to create a public forum for examining individual trace files with a broader audience for a collective learning experience. Trace files will be gathered from attendees prior to SharkFest and only given to the panel members during the session so that the &#8220;not-
knowing what to expect and whether it can be solved&#8221; experience of working through an unknown trace file can be preserved.
Come to this session and learn to ask the right questions and look at packets in different ways.
PLEASE SEND PERPLEXING TRACE FILES FOR ANALYSIS BY THE PANEL TO jasper@packet-foo.com PRIOR TO SHARKFEST!</abstract>
                <slug>sharkfest-25-europe-2025-143-the-packet-doctors-are-in-packet-trace-examinations-with-the-experts</slug>
                <track>Beginner</track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>true</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/CHKWHN/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/CHKWHN/feedback/</feedback_url>
            </event>
            <event guid='d45c5f69-d202-582c-82be-192cae532595' id='159'>
                <room>Grand Ballroom Salons AB</room>
                <title>Wireshark in Action: Empowering Education and Research</title>
                <subtitle></subtitle>
                <type>Presentation</type>
                <date>2025-11-06T15:15:00+01:00</date>
                <start>15:15</start>
                <duration>01:00</duration>
                <abstract>Network packet analysis remains a cornerstone in both education and research. In this session, we will present a series of practical examples that illustrate its continued relevance and versatility. Our proven format remains unchanged from previous years&#8212;expect an interactive, engaging experience enhanced by gamification elements that create a dynamic learning environment.
As technology and methodologies evolve, so does our content. We will explore and demonstrate new insights, and approaches that have emerged over the past year. Whether you&apos;re new to packet analysis or looking to deepen your expertise, this session will leave you with fresh perspectives and actionable ideas to take away.</abstract>
                <slug>sharkfest-25-europe-2025-159-wireshark-in-action-empowering-education-and-research</slug>
                <track>Beginner</track>
                
                <persons>
                    <person id='67'>Tom Cordemans</person><person id='65'>Ville Haapakangas</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/HREGSB/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/HREGSB/feedback/</feedback_url>
            </event>
            <event guid='2afdfe38-aa03-5726-8ac9-deb867660c91' id='173'>
                <room>Grand Ballroom Salons AB</room>
                <title>Handcrafted Packets: Build network packets with Scapy</title>
                <subtitle></subtitle>
                <type>Presentation</type>
                <date>2025-11-06T16:30:00+01:00</date>
                <start>16:30</start>
                <duration>01:00</duration>
                <abstract>&#8226; You want to reproduce a network problem for specific frames?
&#8226; You want to test a Wireshark dissector you&#8217;ve developed but a sample capture is missing?
&#8226; You want to test whether an application reacts to all defined commands?
&#8226; You do a penetration test and want to see how a network device handles undefined data (e.g. with TCP MSS=0)

For all these cases, Scapy can help you build the packets you need. In this talk, I will show you how to do it. Scapy is
a packet manipulation tool written in Python. It can forge or decode packets, send them on the wire, capture them, and
match requests and replies. At the end of the session, we can assemble packages together in a hands-on session. =&gt; Bring
your laptop with you.</abstract>
                <slug>sharkfest-25-europe-2025-173-handcrafted-packets-build-network-packets-with-scapy</slug>
                <track>Intermediate</track>
                
                <persons>
                    <person id='45'>Uli Heilmeier</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/GWBY8A/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/GWBY8A/feedback/</feedback_url>
            </event>
            <event guid='f088e260-c1bc-591a-a6ea-4d59844ef07f' id='162'>
                <room>Grand Ballroom Salons AB</room>
                <title>HTTP deep dive</title>
                <subtitle></subtitle>
                <type>Presentation</type>
                <date>2025-11-06T17:45:00+01:00</date>
                <start>17:45</start>
                <duration>01:00</duration>
                <abstract>In the past HTTP was just used for websites. Today many applications depend on APIs, using HTTP(S) as communication protocol as well. So, when troubleshooting there is a big change that you have to investigate HTTP traffic. With HTTP/2 and HTTP/3 becoming more popular that may require a different approach.
This session is not only about how to use Wireshark, but especially about understanding the protocol. What the HTTP status codes really mean, quirks of cookies, caching done the right way, compression and more.</abstract>
                <slug>sharkfest-25-europe-2025-162-http-deep-dive</slug>
                <track>Beginner</track>
                
                <persons>
                    <person id='57'>Andr&#233; Luyer</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/DE8KZY/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/DE8KZY/feedback/</feedback_url>
            </event>
            <event guid='be879b22-206a-5f58-894d-2261839dd464' id='140'>
                <room>Grand Ballroom Salons AB</room>
                <title>Sponsor Technology Showcase Reception, esPCAPe Group Packet Challenge and Dinner</title>
                <subtitle></subtitle>
                <type>Dinner</type>
                <date>2025-11-06T18:45:00+01:00</date>
                <start>18:45</start>
                <duration>03:00</duration>
                <abstract>Sake&apos;s esPCAPe Group Packet Challenge is back!</abstract>
                <slug>sharkfest-25-europe-2025-140-sponsor-technology-showcase-reception-espcape-group-packet-challenge-and-dinner</slug>
                <track>Organization</track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                <description>Sake&apos;s esPCAPe Group Packet Challenge is back!</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/WHU9VP/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/WHU9VP/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Grand Ballroom Salons CDE' guid='d89863ae-3316-5419-babb-84355d4133c9'>
            <event guid='15eb89c6-5990-5e36-a699-af7daf6a3f23' id='172'>
                <room>Grand Ballroom Salons CDE</room>
                <title>SMB Masterclass - Outtakes and Lessons Learned</title>
                <subtitle></subtitle>
                <type>Presentation</type>
                <date>2025-11-06T10:15:00+01:00</date>
                <start>10:15</start>
                <duration>01:00</duration>
                <abstract>The SMB masterclass (available as pre-conference training) throws students into the network of a fictitious company. With the limited time of a one-day class, I had prepared few use cases that did not make it into the class. Here is an extra hour of SMB analysis with a focus on performance analysis.</abstract>
                <slug>sharkfest-25-europe-2025-172-smb-masterclass-outtakes-and-lessons-learned</slug>
                <track>Beginner</track>
                
                <persons>
                    <person id='66'>Eddi Blenkers</person>
                </persons>
                <language>en</language>
                <description>The lab environment for the class includes a Windows domain, multiple servers, workstations and applications. The applications were custom-build for this class to show odd behavior from real-world scenarios. 
This presentation will show, how to go from a user experience (&quot;it&apos;s slow&quot;), get around the usual blame (&quot;it&apos;s the network&quot;) and then identify the root cause. 
#pcapincluded

Please find additional material at https://www.stellar-bluetani.space/sf25eu/</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/3LRMGH/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/3LRMGH/feedback/</feedback_url>
            </event>
            <event guid='66053bfa-2fe4-5d9e-84fc-3dcd1c4bce9c' id='167'>
                <room>Grand Ballroom Salons CDE</room>
                <title>Dissector developer design notes</title>
                <subtitle></subtitle>
                <type>Presentation</type>
                <date>2025-11-06T11:30:00+01:00</date>
                <start>11:30</start>
                <duration>01:00</duration>
                <abstract>In this talk we&apos;ll go over lots of the details that dissector developers have to contend with. Not only will we touch on some of the Epan APIs available to us, but we will go beyond the API&apos;s and discuss the way of thinking about packet dissection design. Here we may discover wisdoms which are not only important to dissector developers, but for software development in general.

Even though in this talk we will focus on development of C code, Lua dissector developers may take away some deeper insights as well.</abstract>
                <slug>sharkfest-25-europe-2025-167-dissector-developer-design-notes</slug>
                <track>Expert / Developer</track>
                
                <persons>
                    <person id='7'>Jaap Keuter</person>
                </persons>
                <language>en</language>
                <description>As a core developer I get to see a lot of dissector code, in the form of merge requests, during investigation of bugs, or written by myself. While working on this code I often come across designs which are not optimal for the purpose they serve. This may have to do with the use of poor examples, missing insight into how the packet dissection process really works or lack of understanding of the protocols at hand. Either way more knowledge and insight will hopefully help you to create better dissectors.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/SSSB3Q/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/SSSB3Q/feedback/</feedback_url>
            </event>
            <event guid='34808ebd-0459-5f47-905d-8030e94f6950' id='177'>
                <room>Grand Ballroom Salons CDE</room>
                <title>The Art of Sanitization</title>
                <subtitle></subtitle>
                <type>Presentation</type>
                <date>2025-11-06T15:15:00+01:00</date>
                <start>15:15</start>
                <duration>01:00</duration>
                <abstract>Every once in a while there is a need to share actual capture files with others. Maybe a technical support person at a vendor needs packets to troubleshoot a device your company bought. Or you want to ask a more seasoned network analyst for help (the packet doctors at Sharkfest, for example ;)) In many cases it is necessary to remove sensitive information from the capture file first, for example IP addresses or even meta information about the capture itself. There are different ways to achieve the goal of a sanitized capture file, but there are pros and cons to all of them. In this session we&apos;ll take a look at the various option so that you know how to share your capture files without exposing sensitive information.</abstract>
                <slug>sharkfest-25-europe-2025-177-the-art-of-sanitization</slug>
                <track>Security</track>
                
                <persons>
                    <person id='2'>Jasper Bongertz</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/TUW8JR/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/TUW8JR/feedback/</feedback_url>
            </event>
            <event guid='edf6b4bb-b8e0-597b-948f-29b518ec2fc8' id='175'>
                <room>Grand Ballroom Salons CDE</room>
                <title>Attacking IPv4 Networks with IPv6: Security Implications of Dual Stack and native IPv6 Support</title>
                <subtitle></subtitle>
                <type>Presentation</type>
                <date>2025-11-06T16:30:00+01:00</date>
                <start>16:30</start>
                <duration>01:00</duration>
                <abstract>Modern operating systems ship with native IPv6 support and dual stack configurations enabled by default. While this is essential for comprehensive connectivity, it introduces subtle yet critical security risks - especially in environments still predominantly focusing on IPv4 and IPv4 security.
This talk provides an overview of dynamic IPv6 configuration options and explores how attackers can exploit IPv6 capabilities to compromise IPv4 networks. We will demonstrate how IPv6 features - such as SLAAC, Router Advertisements, and DHCPv6 - can be weaponized in dual stack setups. For this, we will use Wireshark to analyze different types of attacks and the corresponding behaviors of the targeted operating systems at the packet level. Finally, we will conclude our talk with recommended mitigation strategies for the identified issues.</abstract>
                <slug>sharkfest-25-europe-2025-175-attacking-ipv4-networks-with-ipv6-security-implications-of-dual-stack-and-native-ipv6-support</slug>
                <track>Security</track>
                
                <persons>
                    <person id='130'>Gabor &#214;sterreicher</person><person id='131'>Stefan Machherndl</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/BEGBHS/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/BEGBHS/feedback/</feedback_url>
            </event>
            <event guid='a681d6cc-9806-5e45-b1b6-9f86f828378f' id='176'>
                <room>Grand Ballroom Salons CDE</room>
                <title>Troubleshooting VoIP | SIP- &amp; RTP-Analysis with Wireshark</title>
                <subtitle></subtitle>
                <type>Presentation</type>
                <date>2025-11-06T17:45:00+01:00</date>
                <start>17:45</start>
                <duration>01:00</duration>
                <abstract>Nearly every organization is using Voice over IP (VoIP) in their networks. But sometimes Administrators and Engineers are facing complex challenges. At the signalling part they see incompatibilities between vendors from over 100 RFCs regarding SIP or some weird SIP stack implementations. On the audio side, end-users sometimes experience bad quality because of jitter, loss or latency or they have one-way audio effects because of bad media descriptions. All this comes coupled with the increasing use of encryption and NAT by cloud PBX solutions such as Teams Phone or Webex Calling. 

Attendees will explore the fundamentals of SIP and RTP paired with the use of integrated tools in Wireshark for an effective and efficient troubleshooting. They get some real-world examples and they will be told how these were solved using Wireshark.</abstract>
                <slug>sharkfest-25-europe-2025-176-troubleshooting-voip-sip-rtp-analysis-with-wireshark</slug>
                <track>Beginner</track>
                
                <persons>
                    <person id='132'>Benjamin Pfister</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/8WPTVX/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/8WPTVX/feedback/</feedback_url>
            </event>
            
        </room>
        
    </day>
    <day index='5' date='2025-11-07' start='2025-11-07T04:00:00+01:00' end='2025-11-08T03:59:00+01:00'>
        <room name='Grand Ballroom Salons AB' guid='253b4214-1e2a-5850-949c-0b8a9292b758'>
            <event guid='03873d49-c9b3-5060-b2bb-87f31c575f48' id='144'>
                <room>Grand Ballroom Salons AB</room>
                <title>SharkBytes</title>
                <subtitle></subtitle>
                <type>Organization</type>
                <date>2025-11-07T09:00:00+01:00</date>
                <start>09:00</start>
                <duration>01:00</duration>
                <abstract>Come and enjoy an interesting session with learning interesting stuff about each other!</abstract>
                <slug>sharkfest-25-europe-2025-144-sharkbytes</slug>
                <track>Organization</track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                <description>SharkBytes are great fun and a highlight of the SharkFest conferences. Each year, attendees offer glimpses into their lives by speaking about a particular interest or hobby (unrelated to Wireshark!) that reveals a side of them that fellow SharkFesters would not otherwise know.
If you want to volunteer to present a 5-minute Byte, please send us an email:
sharkfest@wireshark.org</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/ENQ77T/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/ENQ77T/feedback/</feedback_url>
            </event>
            <event guid='246149fe-dfc0-5869-93ac-f3060a5d94cd' id='150'>
                <room>Grand Ballroom Salons AB</room>
                <title>May I analyze your network? &#8211; Planning and preparing packet captures</title>
                <subtitle></subtitle>
                <type>Presentation</type>
                <date>2025-11-07T10:15:00+01:00</date>
                <start>10:15</start>
                <duration>01:00</duration>
                <abstract>To analyze PCAP files, you have to learn a lot about protocols, processes and typical problems in networks. However, it is just as important to collect the right data at the right place in the network in order to obtain the packet data required for the analysis.
Network analysts need clearly defined tasks of what to identify, check, prove or solve. They need to understand the network structure and application behavior at customer sites and finally get permission to capture application traffic with the required equipment.
In this presentation, Matthias will discuss the issues network analysts need to address before they start collecting data from customer sites or from their own corporate networks. Using real cases, he will explain what was helpful for a successful analysis, and what was not.</abstract>
                <slug>sharkfest-25-europe-2025-150-may-i-analyze-your-network-planning-and-preparing-packet-captures</slug>
                <track>Intermediate</track>
                
                <persons>
                    <person id='43'>Matthias Kaiser</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/NZZFEB/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/NZZFEB/feedback/</feedback_url>
            </event>
            <event guid='ea910c5d-d0a3-5d30-b3e0-6eca19159212' id='181'>
                <room>Grand Ballroom Salons AB</room>
                <title>User-Centered Visual Analysis of PCAP Data</title>
                <subtitle></subtitle>
                <type>Presentation</type>
                <date>2025-11-07T11:30:00+01:00</date>
                <start>11:30</start>
                <duration>01:00</duration>
                <abstract>This talk presents NetCapVis, a visual analytics tool that allows users to easily overview PCAP data and quickly filter to relevant data.
While Wireshark excels at data processing, its data presentation is complex, and operating it efficiently requires expertise.
NetCapVis is the result of a research project and is under development. New research ideas focus on AI classification of packets and explainable AI visualization.
One possible future direction is to collaborate on connecting the visual-interactive dashboard to Wireshark as a plugin.
The talk will focus on three core topics. 
1. Visual-Interactive Analysis 
2. AI Classification and Explainable AI
3. The combination of the visual-interactive dashboard and Wireshark</abstract>
                <slug>sharkfest-25-europe-2025-181-user-centered-visual-analysis-of-pcap-data</slug>
                <track>Intermediate</track>
                
                <persons>
                    <person id='134'>Dr. Alex Ulmer</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/RKPTXF/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/RKPTXF/feedback/</feedback_url>
            </event>
            <event guid='f269d93a-acfd-580b-9929-cad4e569e684' id='141'>
                <room>Grand Ballroom Salons AB</room>
                <title>Lunch, Closing Remarks and Farewell reception</title>
                <subtitle></subtitle>
                <type>Organization</type>
                <date>2025-11-07T12:30:00+01:00</date>
                <start>12:30</start>
                <duration>02:00</duration>
                <abstract>Lunch, Closing Remarks and Farewell reception</abstract>
                <slug>sharkfest-25-europe-2025-141-lunch-closing-remarks-and-farewell-reception</slug>
                <track>Organization</track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/FCP7CD/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/FCP7CD/feedback/</feedback_url>
            </event>
            
        </room>
        <room name='Grand Ballroom Salons CDE' guid='d89863ae-3316-5419-babb-84355d4133c9'>
            <event guid='acd4958e-f681-5985-871b-fb3cad63277e' id='184'>
                <room>Grand Ballroom Salons CDE</room>
                <title>CyberShark 3001 - Capture and Decrypt Wifi Traffic from any device - The Lessons Learned.</title>
                <subtitle></subtitle>
                <type>Presentation</type>
                <date>2025-11-07T10:15:00+01:00</date>
                <start>10:15</start>
                <duration>01:00</duration>
                <abstract>Ever struggled with capturing traffic from your mobile device or felt stumped by encrypted applications? Dive into this comprehensive session to build your very own wired or wireless traffic sniffer using a Raspberry Pi.</abstract>
                <slug>sharkfest-25-europe-2025-184-cybershark-3001-capture-and-decrypt-wifi-traffic-from-any-device-the-lessons-learned</slug>
                <track>Intermediate</track>
                
                <persons>
                    <person id='9'>Ross Bagurdes</person>
                </persons>
                <language>en</language>
                <description>In this engaging workshop, you&apos;ll explore:

-Using a Raspberry Pi as a man in the middle to capture and decrypt app data from smart phones and tablets.  
-How Encryption and Decryption works, in a very simple visual way, so we can understand what the man in the middle proxy is actually doing.
-Selecting the right raspberry pi hardware and software.
-The lessons learned and why it generally failed.</description>
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/9ACKNM/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/9ACKNM/feedback/</feedback_url>
            </event>
            <event guid='a2313391-15ea-50c7-8c46-f834328cb944' id='156'>
                <room>Grand Ballroom Salons CDE</room>
                <title>WTSC election report</title>
                <subtitle></subtitle>
                <type>Presentation</type>
                <date>2025-11-07T11:30:00+01:00</date>
                <start>11:30</start>
                <duration>00:30</duration>
                <abstract>This year was the first time that the election of Wireshark Technical Steering Committee (WTSC) members took place.
In this session we want to report how the election went, how it was organised, what we learned for the next time and why &quot;a few emails and validating and counting responses and maybe a couple of online meetings for the EC folks&quot; is not enough.</abstract>
                <slug>sharkfest-25-europe-2025-156-wtsc-election-report</slug>
                <track>Beginner</track>
                
                <persons>
                    <person id='45'>Uli Heilmeier</person>
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/NTTZDW/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/NTTZDW/feedback/</feedback_url>
            </event>
            <event guid='9b440360-25c5-5848-8818-2ba61d1020a7' id='185'>
                <room>Grand Ballroom Salons CDE</room>
                <title>Foundation and WTSC Q&amp;A</title>
                <subtitle></subtitle>
                <type>Presentation</type>
                <date>2025-11-07T12:00:00+01:00</date>
                <start>12:00</start>
                <duration>00:30</duration>
                <abstract>Come and talk to us if you have any wishes or requests for the foundation or the WTSC board members.</abstract>
                <slug>sharkfest-25-europe-2025-185-foundation-and-wtsc-q-a</slug>
                <track>Organization</track>
                
                <persons>
                    
                </persons>
                <language>en</language>
                
                <recording>
                    <license></license>
                    <optout>false</optout>
                </recording>
                <links></links>
                <attachments></attachments>

                <url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/7KLGGZ/</url>
                <feedback_url>https://conference.wireshark.org/sharkfest-25-europe-2025/talk/7KLGGZ/feedback/</feedback_url>
            </event>
            
        </room>
        
    </day>
    
</schedule>
