SharkFest 25 EUROPE

To see our schedule with full functionality, like timezone conversion and personal scheduling, please enable JavaScript and go here.
08:30
08:30
540min
Pre-conference class III: SMB Masterclass // Starting at 08:30
Eddi Blenkers

SMB is the bread and butter protocol used to access file shares in virtually every company and home network. Since Windows Vista / Server 2008, the "classic" SMB has been replaced by SMB2 and later SMB3. Since legacy systems running Windows XP / Server 2003 are increasingly rare, we focus on the newer version.

This class will enable students to investigate functional issues and performance problems. Topics covered are

  • SMB Handshake, selection of a dialect version and user authentication

  • General process of mounting a share and accessing files

  • Tracking SMB sessions over multiple interfaces or IP-addresses

  • SMB functions beyond file sharing (IPC, Named Pipes)

  • Investigating error codes

  • Decryption of SMB traffic (not for the faint-hearted)

  • Understanding the service response time feature for SMB

  • identification of performance bottlenecks in the network, application logic, client or server

Pre-conference class
Grand Ballroom Salons CDE
09:00
09:00
480min
Pre-conference class I: Essential Wireshark Skills: Practical Packet Analysis (2-day class)
Ross Bagurdes

Level up your Wireshark skills and get ready for Sharkfest! This hands-on course will provide core Wireshark skills for IT pros of all experience levels. Participants will gain a solid understanding of how to use Wireshark to capture, analyze, and troubleshoot network traffic. The course is designed with beginners in mind, but even seasoned packet people will pick up new tips and tricks.

Pre-conference class
Grand Ballroom Salons AB
17:30
17:30
180min
SharkFest'25 EUROPE Welcome Dinner & Sponsor Showcase

Let's kick-off the conference in style!

Organization
Grand Ballroom Salons AB
09:00
09:00
60min
Keynote: What's New in Wireshark 4.6?

Gerald Combs & Friends talk about the new developments over the past year

Organization
Grand Ballroom Salons AB
10:00
10:00
15min
Break
Grand Ballroom Salons AB
10:00
15min
Break
Grand Ballroom Salons CDE
10:15
10:15
60min
Introduction to Cloud Packet Capture
Stephen Donnelly

Cloud computing is often described in a very abstract way, but in reality relies on the same networking technologies and protocols we use every day. How can we get visibility into Cloud networks to troubleshoot and secure them?

What are the differences between traditional On-premise and Cloud networking and architectures, and what does this tell us about attitudes towards network based security and trouble-shooting?

In this talk we will look at Cloud networking from the user perspective, and what some common Cloud architectures look like. We will review options for Packet Capture and network based tools in Cloud compared to On-prem environments, and discuss whether it is practical, beneficial, and necessary.

Beginner
Grand Ballroom Salons AB
10:15
60min
Packet Stories
Sake Blok

To be the network or not to be the network, that's the question!

This is a question we face a lot. The network is blamed by default, but is it really the network. During this session a couple of real life cases will be presented. What was the problem, how was it analyzed, what can we learn about the process and off course the answer to the question: was it the network?

Expert / Developer
Grand Ballroom Salons CDE
11:15
11:15
15min
Break
Grand Ballroom Salons AB
11:15
15min
Break
Grand Ballroom Salons CDE
11:30
11:30
60min
Secure DNS: Attacks and Defenses
Johannes Weber

DNS is a foundational part of the Internet - but also a prime target for attackers. In this talk, we dive into common DNS attack vectors like spoofing, command-and-control traffic via DNS, or DNS tunnelling. We'll explore modern defence mechanisms such as DNSSEC, DNS-over-HTTPS (DoH), and DNS-over-TLS (DoT), and how they help protect DNS integrity and privacy. You'll also get insights into leveraging threat intel and malware feeds to detect malicious domains, plus a look at useful tools for DNS troubleshooting and analysis.

Security
Grand Ballroom Salons CDE
11:30
60min
Wireless with Wireshark
Megumi Takeshita

Scanning wireless to find devices with Wireshark

Intermediate
Grand Ballroom Salons AB
12:30
12:30
60min
Lunch
Grand Ballroom Salons AB
12:30
60min
Lunch
Grand Ballroom Salons CDE
13:30
13:30
60min
Bridging the IT/OT Divide: Analyzing Operational Technology Networks with Wireshark
Roland Knall

Modern industrial networks pose unique challenges for packet analysis. This talk will introduce Wireshark users to the world of Operational Technology (OT) networks – the networks that control physical equipment in factories, power plants, and critical infrastructure – and explain how they differ from traditional Information Technology (IT) networks. We will explore how OT networks prioritize deterministic, time-critical communication in a way that IT networks do not, and why capturing and analyzing packets in OT environments is often more challenging. Attendees will learn about the distinct network architectures and protocols used in OT (from fieldbus and PLC communications to SCADA systems), and how factors like cycle times and real-time scheduling shape traffic patterns. We’ll discuss why OT traffic tends to be highly regular and cyclic (enabling whitelisting of expected flows) in contrast to the bursty, ad-hoc traffic of IT networks . The talk will also highlight security implicat

Beginner
Grand Ballroom Salons AB
13:30
60min
Talk with Your Packets: AI-Powered Natural Language Interaction with Packet Captures (part 1)
John Capobianco

Unlock a groundbreaking approach to packet analysis with "Talk with Your Packets," where cutting-edge AI and Large Language Models (LLMs) meet the world of .pcap and .pcapng files. This session explores how natural language, combined with artificial intelligence and a Retrieval Augmented Generation (RAG) pipeline, can transform traditional packet analysis.

We’ll dive into how packets are converted into JSON representations via the CLI, chunked for efficient processing, embedded as vectors, and stored in ChromaDB for retrieval. Democratizing access to advanced packet analysis and making it easier for users to ask meaningful questions about their packet captures.

While this solution augments Wireshark by aiding in the filtering and crafting of high-value .pcaps (garbage in, garbage out), it does not replace Wireshark. Instead, it empowers analysts with a more intuitive and streamlined way to interpret packet data.

Expert / Developer
Grand Ballroom Salons CDE
14:30
14:30
15min
Break
Grand Ballroom Salons AB
14:30
15min
Break
Grand Ballroom Salons CDE
14:45
14:45
60min
Let's use wireshark to better understand Kubernetes
Sergey Guzenkov

In this talk we will get an overview of networking setup in Kubernetes on the example of Openshift.
We will also see how application traffic can be captured and analysed.

Intermediate
Grand Ballroom Salons AB
14:45
135min
Talk with Your Packets: AI-Powered Natural Language Interaction with Packet Captures (part 2, Lab)
John Capobianco

A hands on lab that goes with the lecture. People will be using AI and NL to 'talk to their packets'

2 hour lab

Expert / Developer
Grand Ballroom Salons CDE
15:45
15:45
15min
Break
Grand Ballroom Salons AB
16:00
16:00
60min
From Full Capture to Criminal Evidence: A Real-World Case of Lawful Interception
Daniel Spiekermann

You’ve wiretapped a suspect’s internet connection. You have the entire packet capture — but not a single clue about what’s relevant, or even what you’re trying to find.

In this session, we walk through a real-life criminal investigation involving the forensic analysis of a standard residential internet connection. The task: uncover evidence of illegal online activity, without prior knowledge of the services used, IP addresses involved, or even the nature of the communication.

Using only Wireshark and patience, the investigator faced hundreds of thousands of packets, countless domains, and protocols ranging from common to obscure. There were no predefined indicators of suspicious communication—just raw traffic and a hunch that something was hidden within.

This talk will demonstrate how targeted filtering, temporal analysis, and a dose of good old-fashioned intuition led to the successful identification of suspicious communication. Starting with nothing but a massive stream of packet

Intermediate
Grand Ballroom Salons AB
17:00
17:00
15min
Break
Grand Ballroom Salons AB
17:00
15min
Break
Grand Ballroom Salons CDE
17:15
17:15
60min
LTE / 5G packet flow explained
Mark Stout

We'll walk through packets captured from a cell phone acquiring a tower, and follow the packet all the way out to the internet. Show filters used when troubleshooting 4G/5G, as well as some real world problems.

Intermediate
Grand Ballroom Salons CDE
17:15
60min
Level up your MPLS skills - A Wireshark-driven approach
Pierre Besombes, Juan Pablo Azar Ricciardi

This session offers a practical, Wireshark-driven approach to understanding and troubleshooting MPLS. The goal is to articulate the control plane and data plane's inner workings through packet analysis. We'll deep-dive into packet structures, label exchange mechanisms, and eventually explore some traffic engineering scenarios. This session begins with a quick review of MPLS fundamentals, then dives into real-world use cases and potentially explores related technologies and advancements like SR-MPLS.

Intermediate
Grand Ballroom Salons AB
18:30
18:30
180min
Sponsor Technology Showcase Reception & Dinner

Join us for a fun night with an opportunity to enjoy wonderful conversations and win some nice prizes!

Organization
Grand Ballroom Salons AB
09:00
09:00
45min
Keynote: Shift the Conversation: Open Source is Free, But Not Free-Free
Kelley Misata

Open-source software is everywhere—from network security tools like Wireshark and Suricata to the critical infrastructure enterprises rely on daily. Yet, when OSS enters the corporate conversation, it’s often met with "Isn’t it free? Why should we invest in it?" or “Won’t the community just take care of everything.” or "Who’s responsible if something goes wrong?" Instead of treating OSS as a strategic asset, these misconceptions create barriers to security, sustainability, and innovation.

This session will help you shift the OSS conversation—moving from passive consumption to active engagement. Drawing from real-world experience leading OISF (Suricata), we’ll explore how to make the business case for OSS, advocate for responsible adoption, and integrate due diligence into enterprise processes. Attendees will leave with strategies to foster internal support and transform OSS from an afterthought into a competitive advantage.

Intermediate
Grand Ballroom Salons AB
09:45
09:45
15min
New break
Grand Ballroom Salons AB
09:45
15min
New break
Grand Ballroom Salons CDE
10:15
10:15
60min
New kid on the block: Stratoshark
Sake Blok

Gerald has been working on a new tool that has just been released to the public: Stratoshark. It has the same look and feel of Wireshark (as it shares quite a bit of common code), but you can analyze (linux) system calls and (cloud) logs with it.

As per www.stratoshark.org:
Stratoshark lets you explore and investigate the application-level behavior of your systems. You can capture system call and log activity and use a variety of advanced features to troubleshoot and analyze that activity. If you've ever used Wireshark, Stratoshark will look very familiar! It's a sibling application that shares the same dissection and filtering engine and much of the same user interface. It supports the same file format as Falco and Sysdig CLI, which lets you pivot seamlessly between each tool. As an added bonus, it's open source, just like Wireshark and Falco.

This talk will give you an introduction to Stratoshark and some hints to get started your Stratoshark journey.

Intermediate
Grand Ballroom Salons AB
10:15
60min
SMB Masterclass - Outtakes and Lessons Learned
Eddi Blenkers

The SMB masterclass (available as pre-conference training) throws students into the network of a fictitious company. With the limited time of a one-day class, I had prepared few use cases that did not make it into the class. Here is an extra hour of SMB analysis with a focus on performance analysis.

Beginner
Grand Ballroom Salons CDE
11:15
11:15
15min
Break
Grand Ballroom Salons AB
11:15
15min
Break
Grand Ballroom Salons CDE
11:30
11:30
60min
Dissector developer design notes
Jaap Keuter

In this talk we'll go over lots of the details that dissector developers have to contend with. Not only will we touch on some of the Epan APIs available to us, but we will go beyond the API's and discuss the way of thinking about packet dissection design. Here we may discover wisdoms which are not only important to dissector developers, but for software development in general.

Even though in this talk we will focus on development of C code, Lua dissector developers may take away some deeper insights as well.

Expert / Developer
Grand Ballroom Salons CDE
11:30
60min
Making WebRTC work in times of locked down networks - A hands-on session on how to find out what your favorite Web Conferencing tool really needs
Robert Hess

According to their documentation, modern WebRTC based conferencing solutions require literally thousands of open ports to hundreds of thousands IP addresses to play.
How come they still work in todays super restrictive corporate networks - when they were conceived at a time were the Internet was still an idyllic place and a firewall just a clean cut packet filter.
And how you can fix them, in case they don't cooperate
I invite you to my journey of finding this out and I'll show you my implements ;-)

Intermediate
Grand Ballroom Salons AB
12:30
12:30
60min
Lunch
Grand Ballroom Salons AB
12:30
60min
Lunch
Grand Ballroom Salons CDE
13:30
13:30
90min
The Packet Doctors are in! Packet trace examinations with the experts

The experts on this panel have been asked to look at a trace file and help find a reason for certain behaviors by attendees at many SharkFests. Based on this, they’ve decided to create a public forum for examining individual trace files with a broader audience for a collective learning experience. Trace files will be gathered from attendees prior to SharkFest and only given to the panel members during the session so that the “not-
knowing what to expect and whether it can be solved” experience of working through an unknown trace file can be preserved.
Come to this session and learn to ask the right questions and look at packets in different ways.
PLEASE SEND PERPLEXING TRACE FILES FOR ANALYSIS BY THE PANEL TO [email protected] PRIOR TO SHARKFEST!

Beginner
Grand Ballroom Salons AB
15:00
15:00
15min
Break
Grand Ballroom Salons AB
15:00
15min
Break
Grand Ballroom Salons CDE
15:15
15:15
60min
The Art of Sanitization
Jasper Bongertz

Every once in a while there is a need to share actual capture files with others. Maybe a technical support person at a vendor needs packets to troubleshoot a device your company bought. Or you want to ask a more seasoned network analyst for help (the packet doctors at Sharkfest, for example ;)) In many cases it is necessary to remove sensitive information from the capture file first, for example IP addresses or even meta information about the capture itself. There are different ways to achieve the goal of a sanitized capture file, but there are pros and cons to all of them. In this session we'll take a look at the various option so that you know how to share your capture files without exposing sensitive information.

Security
Grand Ballroom Salons CDE
15:15
60min
Wireshark in Action: Empowering Education and Research
Tom Cordemans, Ville Haapakangas

Network packet analysis remains a cornerstone in both education and research. In this session, we will present a series of practical examples that illustrate its continued relevance and versatility. Our proven format remains unchanged from previous years—expect an interactive, engaging experience enhanced by gamification elements that create a dynamic learning environment.
As technology and methodologies evolve, so does our content. We will explore and demonstrate new insights, and approaches that have emerged over the past year. Whether you're new to packet analysis or looking to deepen your expertise, this session will leave you with fresh perspectives and actionable ideas to take away.

Beginner
Grand Ballroom Salons AB
16:15
16:15
15min
Break
Grand Ballroom Salons AB
16:15
15min
Break
Grand Ballroom Salons CDE
16:30
16:30
60min
Attacking IPv4 Networks with IPv6: Security Implications of Dual Stack and native IPv6 Support
Gabor Österreicher, Stefan Machherndl

Modern operating systems ship with native IPv6 support and dual stack configurations enabled by default. While this is essential for comprehensive connectivity, it introduces subtle yet critical security risks - especially in environments still predominantly focusing on IPv4 and IPv4 security.
This talk provides an overview of dynamic IPv6 configuration options and explores how attackers can exploit IPv6 capabilities to compromise IPv4 networks. We will demonstrate how IPv6 features - such as SLAAC, Router Advertisements, and DHCPv6 - can be weaponized in dual stack setups. For this, we will use Wireshark to analyze different types of attacks and the corresponding behaviors of the targeted operating systems at the packet level. Finally, we will conclude our talk with recommended mitigation strategies for the identified issues.

Security
Grand Ballroom Salons CDE
16:30
60min
Handcrafted Packets: Build network packets with Scapy
Uli Heilmeier

• You want to reproduce a network problem for specific frames?
• You want to test a Wireshark dissector you’ve developed but a sample capture is missing?
• You want to test whether an application reacts to all defined commands?
• You do a penetration test and want to see how a network device handles undefined data (e.g. with TCP MSS=0)

For all these cases, Scapy can help you build the packets you need. In this talk, I will show you how to do it. Scapy is
a packet manipulation tool written in Python. It can forge or decode packets, send them on the wire, capture them, and
match requests and replies. At the end of the session, we can assemble packages together in a hands-on session. => Bring
your laptop with you.

Intermediate
Grand Ballroom Salons AB
17:30
17:30
15min
Break
Grand Ballroom Salons AB
17:30
15min
Break
Grand Ballroom Salons CDE
17:45
17:45
60min
HTTP deep dive
André Luyer

In the past HTTP was just used for websites. Today many applications depend on APIs, using HTTP(S) as communication protocol as well. So, when troubleshooting there is a big change that you have to investigate HTTP traffic. With HTTP/2 and HTTP/3 becoming more popular that may require a different approach.
This session is not only about how to use Wireshark, but especially about understanding the protocol. What the HTTP status codes really mean, quirks of cookies, caching done the right way, compression and more.

Beginner
Grand Ballroom Salons AB
17:45
60min
Troubleshooting VoIP | SIP- & RTP-Analysis with Wireshark
Benjamin Pfister

Nearly every organization is using Voice over IP (VoIP) in their networks. But sometimes Administrators and Engineers are facing complex challenges. At the signalling part they see incompatibilities between vendors from over 100 RFCs regarding SIP or some weird SIP stack implementations. On the audio side, end-users sometimes experience bad quality because of jitter, loss or latency or they have one-way audio effects because of bad media descriptions. All this comes coupled with the increasing use of encryption and NAT by cloud PBX solutions such as Teams Phone or Webex Calling.

Attendees will explore the fundamentals of SIP and RTP paired with the use of integrated tools in Wireshark for an effective and efficient troubleshooting. They get some real-world examples and they will be told how these were solved using Wireshark.

Beginner
Grand Ballroom Salons CDE
18:45
18:45
180min
Sponsor Technology Showcase Reception, esPCAPe Group Packet Challenge and Dinner

Sake's esPCAPe Group Packet Challenge is back!

Organization
Grand Ballroom Salons AB
09:00
09:00
60min
SharkBytes

Come and enjoy an interesting session with learning interesting stuff about each other!

Organization
Grand Ballroom Salons AB
10:00
10:00
15min
Break
Grand Ballroom Salons AB
10:00
15min
New break
Grand Ballroom Salons CDE
10:15
10:15
60min
CyberShark 3001 - Capture and Decrypt Wifi Traffic from any device - The Lessons Learned.
Ross Bagurdes

Ever struggled with capturing traffic from your mobile device or felt stumped by encrypted applications? Dive into this comprehensive session to build your very own wired or wireless traffic sniffer using a Raspberry Pi.

Intermediate
Grand Ballroom Salons CDE
10:15
60min
May I analyze your network? – Planning and preparing packet captures
Matthias Kaiser

To analyze PCAP files, you have to learn a lot about protocols, processes and typical problems in networks. However, it is just as important to collect the right data at the right place in the network in order to obtain the packet data required for the analysis.
Network analysts need clearly defined tasks of what to identify, check, prove or solve. They need to understand the network structure and application behavior at customer sites and finally get permission to capture application traffic with the required equipment.
In this presentation, Matthias will discuss the issues network analysts need to address before they start collecting data from customer sites or from their own corporate networks. Using real cases, he will explain what was helpful for a successful analysis, and what was not.

Intermediate
Grand Ballroom Salons AB
11:15
11:15
15min
Break
Grand Ballroom Salons AB
11:15
15min
New break
Grand Ballroom Salons CDE
11:30
11:30
60min
User-Centered Visual Analysis of PCAP Data
Dr. Alex Ulmer

This talk presents NetCapVis, a visual analytics tool that allows users to easily overview PCAP data and quickly filter to relevant data.
While Wireshark excels at data processing, its data presentation is complex, and operating it efficiently requires expertise.
NetCapVis is the result of a research project and is under development. New research ideas focus on AI classification of packets and explainable AI visualization.
One possible future direction is to collaborate on connecting the visual-interactive dashboard to Wireshark as a plugin.
The talk will focus on three core topics.
1. Visual-Interactive Analysis
2. AI Classification and Explainable AI
3. The combination of the visual-interactive dashboard and Wireshark

Intermediate
Grand Ballroom Salons AB
11:30
30min
WTSC election report
Uli Heilmeier

This year was the first time that the election of Wireshark Technical Steering Committee (WTSC) members took place.
In this session we want to report how the election went, how it was organised, what we learned for the next time and why "a few emails and validating and counting responses and maybe a couple of online meetings for the EC folks" is not enough.

Beginner
Grand Ballroom Salons CDE
12:00
12:00
30min
Foundation and WTSC Q&A

Come and talk to us if you have any wishes or requests for the foundation or the WTSC board members.

Organization
Grand Ballroom Salons CDE
12:30
12:30
120min
Lunch, Closing Remarks and Farewell reception

Lunch, Closing Remarks and Farewell reception

Organization
Grand Ballroom Salons AB