13.01.2015 Views

11 Basic Track Session Abstracts and Speaker Biographies

11 Basic Track Session Abstracts and Speaker Biographies

11 Basic Track Session Abstracts and Speaker Biographies

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Basic</strong> <strong>Track</strong><br />

<strong>Session</strong> <strong>Abstracts</strong><br />

<strong>and</strong> <strong>Speaker</strong> <strong>Biographies</strong><br />

Published May 13th, 20<strong>11</strong>


SHARKFEST '<strong>11</strong> <strong>Basic</strong> <strong>Track</strong> <strong>Session</strong> <strong>Abstracts</strong> <strong>and</strong> <strong>Speaker</strong> <strong>Biographies</strong> Page 1 of 6<br />

TUESDAY, June 14th<br />

9:15 am – 10:00 am<br />

KEYNOTE: The Architecture & Optimization Methodology of<br />

the libpcap Packet Capture Library<br />

In 1988, I embarked on a research collaboration with Van Jacobson at the<br />

Lawrence Berkeley National Laboratory, where we sought to improve the state of<br />

the art in packet capture systems of that era. This work with Van culminated in<br />

the open-source releases of the network monitoring tool tcpdump, the BSD<br />

packet filter BPF, <strong>and</strong> the packet capture library libpcap.<br />

In this talk, I will describe in detail the architecture that embodies libpcap as well<br />

as reminisce a bit on my work from 20 years ago by sketching some of the<br />

history around tcpdump <strong>and</strong> BPF. With that context established, I will then<br />

discuss the libpcap compiler <strong>and</strong> optimization system <strong>and</strong> walk through a<br />

detailed example of how a high-level filter is translated into an efficient BPF<br />

program. Finally, I will discuss the evolution of libpcap beyond my early work,<br />

<strong>and</strong> compare my compiler-based approach to subsequent developments in<br />

research <strong>and</strong> in industry. Despite these more modern developments, libpcap’s<br />

pervasiveness across Linux, Windows, <strong>and</strong> MacOS as well as its use by the<br />

widely deployed wireshark protocol analyzer seems to indicate that the libpcap<br />

packet capture model has withstood the test of time.<br />

Presenter: Steve McCanne, co-creator tcpdump, co-founder <strong>and</strong><br />

CTO, Riverbed<br />

Steve McCanne earned his bachelor’s degree <strong>and</strong> PhD from the Electrical<br />

Engineering <strong>and</strong> Computer Science department at U.C. Berkeley. While a student,<br />

he conducted research in the areas of packet capture, multicast protocols, signal<br />

compression, multimedia, IP telephony, <strong>and</strong> video conferencing. As part of his<br />

research, Steve co-authored several widely-used open-source software projects,<br />

including the BSD packet filter, libpcap, tcpdump, the ns network simulator, <strong>and</strong> the<br />

MBone tools. Steve also holds an obscure claim to fame that he authored the first<br />

implementation of the modern-day VoIP protocol. After completing his PhD in<br />

1996, he joined the faculty of computer science at U.C. Berkeley <strong>and</strong> served as an<br />

assistant professor. In 1998, he took a leave from his faculty job to co-found<br />

FastForward Networks, where he thrived on developing technology products <strong>and</strong><br />

decided to leave the academic paper writing behind. After he sold FastForward to<br />

Inktomi Corporation in 2000, he served as chief technology officer of Inktomi, until<br />

2002, when he co-founded Riverbed Technology. At Riverbed, Steve developed a<br />

novel solution to enterprise WAN performance problems, work which led to the<br />

creation of a new enterprise product category <strong>and</strong> to the emergence of the multibillion<br />

dollar WAN acceleration market. Steve is currently serving as chief<br />

technology officer at Riverbed <strong>and</strong> is a member of their board of directors.<br />

10:00 am – 10:15 am<br />

10:15 am - <strong>11</strong>:30 am<br />

<strong>11</strong>:30 am - <strong>11</strong>:45 am<br />

<strong>11</strong>:45 am – 1:00 pm<br />

BREAK<br />

B-1: I've Downloaded Wireshark…Now What<br />

Instructor: Betty DuBois, Wireshark U Instructor, Founder,<br />

DuBois Consulting LLC<br />

This is the perfect course to obtain a foundation in Wireshark analysis<br />

Betty DuBois has been a networking instructor <strong>and</strong> consultant for over twenty<br />

functionality. This introductory course defines tap-in points <strong>and</strong> methods, <strong>and</strong> years. Currently, Betty is a Wireshark University Instructor, creator of the "Network<br />

covers capture options <strong>and</strong> capture filters used to reduce the amount of traffic to Mystery" series of videos featured on the wireshark.org site, <strong>and</strong> network<br />

review. Betty provides an overview of key Wireshark areas including the trainer/consultant for hire.<br />

Summary Information, Protocol Hierarchy, Conversations/Endpoints, <strong>and</strong> basic<br />

Display Filtering.<br />

BREAK<br />

B-2: Mobile Application Analysis with Wireshark<br />

Instructor: Joe Bardwell, President, Connect802, Inc.<br />

Joe Bardwell will walk you through <strong>and</strong> explain a real-world troubleshooting<br />

scenario where Wireshark was used to analyze WiFi mobile roaming <strong>and</strong><br />

connectivity problems. The expected 802.<strong>11</strong> behavior will be explained <strong>and</strong> the<br />

deviations from the norm will be called out in Wireshark traces <strong>and</strong> statistics.<br />

You’ll see the techniques used for efficient evaluation of mobile roaming <strong>and</strong><br />

connectivity.<br />

Mr. Bardwell is the President of Connect802 Corporation, a national wireless<br />

system solution provider. Mr. Bardwell was the founding engineer <strong>and</strong> program<br />

manager for the Certified Network Expert (CNX) professional certification program.<br />

His professional career, which spans over 30 years, includes technical<br />

management <strong>and</strong> executive positions with a number of network industry leaders,<br />

including WildPackets <strong>and</strong> Network General.


SHARKFEST '<strong>11</strong> <strong>Basic</strong> <strong>Track</strong> <strong>Session</strong> <strong>Abstracts</strong> <strong>and</strong> <strong>Speaker</strong> <strong>Biographies</strong> Page 2 of 6<br />

1:00 pm - 1:55 pm<br />

2:00 pm - 3:15 pm<br />

LUNCH<br />

B-3: Discovering IPv6 with Wireshark<br />

Instructor: Rolf Leutert, Leutert NetServices<br />

According to the Internet Assigned Numbers Authority, the IPv4 address range Rolf Leutert, a native of Switzerl<strong>and</strong>, founded Leutert Net Services to provide<br />

will be exhausted soon, i.e., no new IPv4 addresses will be available anymore network training, network troubleshooting, <strong>and</strong> consulting in 1988. Since then, the<br />

later this year. Even if you have reserved plenty of IPv4 addresses for your company has delivered hundreds of trainings for Sniffer University <strong>and</strong> other<br />

environment, what about your customers or your strategic partners They may training organizations, <strong>and</strong> Rolf has attained both Certified Network Expert (CNX)<br />

ask you for IPv6 support soon, so it’s time to get IPv6 ready. It’s not only the <strong>and</strong> Sniffer Certified Master status.<br />

huge address space that differentiates IPv6 from IPv4, there’s a lot more like:<br />

new address allocation process, the absence of broadcasts on layers 2 <strong>and</strong> 3,<br />

the better support for mobility <strong>and</strong> much more. Wireshark is the ideal tool to<br />

discover the main protocol differences. During this introduction, you will learn<br />

about new IPv6 fields, address allocation <strong>and</strong> neighbor discovery processes <strong>and</strong><br />

get ready to discover more yourself.<br />

3:15pm – 3:30pm<br />

3:30 pm - 4:45 pm<br />

BREAK<br />

B-4: Visualizing RF<br />

Instructor: Ryan Woodings, Chief Geek, MetaGeek<br />

It's impossible to troubleshoot what you can't see, which is why RF visualization Ryan Woodings is Chief Geek <strong>and</strong> Founder of MetaGeek, LLC, the creators of the<br />

tools are so vital for keeping your WiFi networks up <strong>and</strong> running efficiently. This first truly affordable spectrum analyzer. As MetaGeek has grown, Ryan has worn a<br />

presentation will use several techniques to visually examine signals from a variety of hats. These days, now that he is a new father of a gorgeous baby girl, he<br />

variety of 2.4 <strong>and</strong> 5 GHz devices, showing the interaction of these devices with spends more time around the house <strong>and</strong> less time running the marathons that<br />

WiFi networks. Pay attention, a pop quiz may be administered!<br />

previously occupied most of his spare time.


SHARKFEST '<strong>11</strong> <strong>Basic</strong> <strong>Track</strong> <strong>Session</strong> <strong>Abstracts</strong> <strong>and</strong> <strong>Speaker</strong> <strong>Biographies</strong> Page 3 of 6<br />

WEDNESDAY, June 15th<br />

9:00 am - 10:30 am<br />

B-5: Eliminate Your Monitoring Headaches<br />

Network engineers struggle with limited access points, expensive <strong>and</strong> underutilized<br />

tools <strong>and</strong> complicated monitoring devices. In this session you’ll see firsth<strong>and</strong><br />

how to simplify the management <strong>and</strong> monitoring of expansive networks.<br />

Instructor: Charles Webb, CTO, Anue Systems<br />

Charles Webb, a founder, is the CTO of Anue Systems <strong>and</strong> led the development of<br />

the network emulation platform for Anue. He has more than 20 years of experience<br />

in the design <strong>and</strong> architecture of high-speed networking products. Mr. Webb<br />

presents regularly at conferences such as WSTS <strong>and</strong> ITSF <strong>and</strong> contributes to<br />

st<strong>and</strong>ards development at ITU-T, TIA <strong>and</strong> IEEE. Prior to starting Anue Systems, Mr.<br />

Webb was a distinguished member of technical staff at Bell Laboratories, where he<br />

led teams developing fiber optic networks, HDTV <strong>and</strong> wireless communications.<br />

Mr. Webb holds a master’s degree from Columbia University in electrical<br />

engineering, <strong>and</strong> a bachelor’s degree, with honors, from Rensselaer Polytechnic<br />

Institute. He has co-authored five technical papers <strong>and</strong> has been granted twelve<br />

patents, with seven more pending.<br />

10:30 am - 10:45 am<br />

10:45 am – 12:15 pm<br />

12:15 pm – 1:15 pm<br />

1:15 pm – 2:45 pm<br />

BREAK<br />

B-6: Network Mysteries <strong>and</strong> How To Solve Them<br />

Instructor: Betty DuBois, Wireshark U Instructor <strong>and</strong> Principal<br />

(Mystery #1)<br />

Consultant, DuBois Consulting, LLC<br />

In this session, Detective Betty DuBois will review one of the elusive network Betty DuBois has been a networking Instructor <strong>and</strong> Consultant since 1997.<br />

cases she has solved using Wireshark <strong>and</strong> Pilot. There will be plenty of forensics Currently, Betty is a Wireshark University Instructor, <strong>and</strong> creator of the "Network<br />

evidence provided, <strong>and</strong> lots of practical information to help you solve your own Mystery" series of videos featured on the wireshark.org site, <strong>and</strong> network<br />

network mysteries. This session will be a deep dive into the "Case of the Slow trainer/consultant for hire.<br />

Network". Betty will walk the attendees through how the data was captured<br />

(tshark & AirPcap), the methods used to isolate the problem (SMTP relay<br />

infection), <strong>and</strong> which users were infected. A trace file of the issue will be<br />

provided so attendees can follow along.<br />

LUNCH<br />

B-7: Discovering WLAN 802.<strong>11</strong>n MIMO<br />

Instructors: Rolf Leutert, Leutert NetServices<br />

This session will focus on the ease at which VoIP traffic can be examined, <strong>and</strong><br />

quality of service issues addressed with Wireshark <strong>and</strong> the Pilot UI.<br />

Troubleshooting WLANs is a challenging task already, but underst<strong>and</strong>ing all the<br />

extensions of the new 802.<strong>11</strong>n MIMO st<strong>and</strong>ard is even more dem<strong>and</strong>ing.<br />

This session will provide you with the necessary theoretical background <strong>and</strong><br />

demonstrate the major changes <strong>and</strong> improvements of this high-throughput<br />

st<strong>and</strong>ard by using Wireshark trace files captured with the AirPcap Nx adapter.<br />

You will learn technical details about spatial multiplexing techniques, channel<br />

bonding, frame aggregation, block ACK etc. <strong>and</strong> the issues with backwards<br />

compatibility to 802.<strong>11</strong>a/b/g devices.<br />

Rolf Leutert, a native of Switzerl<strong>and</strong>, founded Leutert Net Services to provide<br />

network training, network troubleshooting, <strong>and</strong> consulting in 1988. Since then, the<br />

company has delivered hundreds of trainings for Sniffer University <strong>and</strong> other<br />

training organizations, <strong>and</strong> Rolf has attained both Certified Network Expert (CNX)<br />

<strong>and</strong> Sniffer Certified Master status.


SHARKFEST '<strong>11</strong> <strong>Basic</strong> <strong>Track</strong> <strong>Session</strong> <strong>Abstracts</strong> <strong>and</strong> <strong>Speaker</strong> <strong>Biographies</strong> Page 4 of 6<br />

2:45 pm – 3:00 pm<br />

B-8: Wireshark Certification - What It is <strong>and</strong> How to Get It<br />

BREAK<br />

Instructor: Laura Chappell, Founder, Wireshark & Chappell U<br />

3:00 pm – 4:30 pm<br />

Learn about the 33 areas of study for the WCNA Certification <strong>and</strong> the best<br />

methods to prepare for the testing-center proctored or online proctored Exam.<br />

Laura Chappell is the founder of Chappell University <strong>and</strong> the co-founder of<br />

Wireshark University with Gerald Combs. Long-time, well-known Wireshark<br />

evangelist <strong>and</strong> author of the best-selling "Wireshark Network Analysis: Official<br />

Wireshark Certified Network Analyst Study Guide" <strong>and</strong> numerous other industry<br />

books, Ms. Chappell began her career as a network analyst in 1991 when Novell<br />

acquired the LANalyzer product. She has worked with numerous analyzer products<br />

since then but, in 1999, decided to focus her analysis time working exclusively with<br />

the open source Ethereal (now known as Wireshark) network <strong>and</strong> protocol analysis<br />

tool.<br />

Recently, Laura developed the Wireshark Certified Network Analyst Program <strong>and</strong><br />

manages the Wireshark University Authorized Training Partner Program <strong>and</strong> the<br />

Wireshark University Authorized Instructor Program.


SHARKFEST '<strong>11</strong> <strong>Basic</strong> <strong>Track</strong> <strong>Session</strong> <strong>Abstracts</strong> <strong>and</strong> <strong>Speaker</strong> <strong>Biographies</strong> Page 5 of 6<br />

THURSDAY, June 16th<br />

B-9: Mobile Application Analysis with Wireshark<br />

Instructor: Joe Bardwell, Founder, Connect802<br />

9:00 am – 10:30 am<br />

10:30 am – 10:45am<br />

10:45 am – 12:15pm<br />

12:15 pm – 1:15 pm<br />

1:30 pm – 3:00 pm<br />

3:00 pm – 3:15 pm<br />

In this session, Joe Bardwell will walk you through <strong>and</strong> explain a real-world<br />

troubleshooting scenario where Wireshark was used to analyze WiFi mobile<br />

roaming <strong>and</strong> connectivity problems. The expected 802.<strong>11</strong> behavior will be<br />

explained <strong>and</strong> the deviations from the norm will be called out in Wireshark traces<br />

<strong>and</strong> statistics. You’ll see the techniques used for efficient evaluation of mobile<br />

roaming <strong>and</strong> connectivity.<br />

Mr. Bardwell is the President of Connect802 Corporation, a national wireless<br />

system solution provider. Mr. Bardwell was the founding engineer <strong>and</strong> program<br />

manager for the Certified Network Expert (CNX) professional certification program.<br />

His professional career, which spans over 30 years, includes technical<br />

management <strong>and</strong> executive positions with a number of network industry leaders,<br />

including WildPackets <strong>and</strong> Network General.<br />

BREAK<br />

B-10 Using Wireshark to Support the Application Instructor: Tim Poth, Sr. Priority Response Analyst, Bentley<br />

Systems<br />

This presentation will take an interactive look at a number of pcap files to show Tim Poth currently works for Bentley Systems, Inc. (www.bentley.com) as a Senior<br />

both interesting "network" issues as well as the technique used to find the Priority Response Analyst primarily supporting ProjectWise, Bentley's document<br />

problem. The files presented show situations that gave our users trouble, such management system.<br />

as:<br />

• Proxies injecting code to http cookies<br />

• Spotting proxy log-in failures<br />

• Unexpected client-side firewall failovers<br />

• Non-intuitive ICMP packets as a result of slow DNS responses<br />

• Peer-to-peer music downloads<br />

LUNCH<br />

B-<strong>11</strong>: Network Mysteries <strong>and</strong> How To Solve Them<br />

Instructor: Betty DuBois, Wireshark U Instructor <strong>and</strong> Principal<br />

(Mystery #2)<br />

Consultant, DuBois Consulting, LLC<br />

In this session, Detective Betty DuBois will review one of the elusive network Betty DuBois has been a networking Instructor <strong>and</strong> Consultant since 1997.<br />

cases she has solved using Wireshark <strong>and</strong> Pilot. There will be plenty of forensics Currently, Betty is a Wireshark University Instructor, <strong>and</strong> creator of the "Network<br />

evidence provided, <strong>and</strong> lots of practical information to help you solve your own Mystery" series of videos featured on the wireshark.org site, <strong>and</strong> network<br />

network mysteries. This session will be a deep dive into the "Case of the trainer/consultant for hire.<br />

Missing Download". Betty will walk attendees through how the data was<br />

captured (tap & Wireshark), the methods used to isolate the problem (Thin client<br />

who could not download its OS), <strong>and</strong> how to prove whose fault it was. A trace<br />

file of the issue will be provided so attendees can follow along. Note: The trace<br />

has been edited to protect the innocent.<br />

BREAK


SHARKFEST '<strong>11</strong> <strong>Basic</strong> <strong>Track</strong> <strong>Session</strong> <strong>Abstracts</strong> <strong>and</strong> <strong>Speaker</strong> <strong>Biographies</strong> Page 6 of 6<br />

3:15 pm - 4:15 pm<br />

B-12: Network Access Security - It's Broken - Now What Instructor: Jeff Carrell, Network Systems <strong>and</strong> Security<br />

Consultant<br />

This presentation will focus on controlling access to the network by requiring Jeff is a network systems <strong>and</strong> security instructor on HP ProCurve Networking<br />

users of computers to authenticate with appropriate credentials <strong>and</strong> devices products, delivering technical courseware through North America. In addition, he<br />

such as Voice over IP (VoIP) phones to also authenticate with credentials, by provides network consulting services with an emphasis on security in wired,<br />

implementing the IEEE 802.1X st<strong>and</strong>ard on the LAN infrastructure. If the wireless, <strong>and</strong> VoIP networks. His 30-year involvement in the computer industry<br />

provided credentials don't pass authentication, the port of the LAN switch includes specific concentration in the internetworking sphere for over 22 of those<br />

remains "closed" so that the network is inaccessible. In addition, policy access years.<br />

controls can also be implemented <strong>and</strong> enforced at the network layer so that once<br />

a user has authenticated on the network, the access granted<br />

can be further refined to only provide access to the systems specifically needed<br />

for the user, <strong>and</strong> also potentially control the time of day/day of week <strong>and</strong> location<br />

(ie., office/desk, conference room, break room, etc.) that the users can have the<br />

access. With this type of user authentication capability, not only can employee<br />

users have the access needed, but guest-type users can be authenticated on the<br />

network <strong>and</strong> be provided only with access that doesn't expose the company's<br />

data assets to increased risk.<br />

The presentation will include a live demonstration.<br />

4:30 pm - 6:00 pm<br />

Wireshark Core Developer Closing Roundtable <strong>and</strong><br />

SHARKFEST Wrap-Up: Looking Ahead to the Next 10 Years –<br />

ROOM 200<br />

Gerald Combs <strong>and</strong> a representative group of Wireshark Core Developers will<br />

discuss the Wireshark Road Map <strong>and</strong> take suggestions from attendees for future<br />

product direction during this closing session.<br />

This time will also be used to summarize our collective experience <strong>and</strong><br />

impressions of our 3 days together <strong>and</strong> to socialize one last time before parting<br />

company.<br />

Moderator: Gerald Combs<br />

Gerald Combs is founder <strong>and</strong> lead developer at Wireshark development team.


H<strong>and</strong>s-On Lab: Building an IPv6 Network from the Ground Up: <strong>Session</strong> Dates <strong>and</strong> Times<br />

MONDAY, June 13th<br />

1:00 pm – 2:15 pm<br />

Building an IPv6 Network - Part One<br />

Instructor: Jeff Carrell, Network Systems <strong>and</strong> Security Consultant<br />

By attending this lab, attendees will configure a network system of several Jeff is a network systems <strong>and</strong> security instructor on HP ProCurve Networking products,<br />

different br<strong>and</strong>s of equipment, utilizing only IPv6, DHCPv6, <strong>and</strong> IPv6 routing. delivering technical courseware through North America. In addition, he provides network<br />

Attendees will be required to provide their own laptop with any operating system consulting services with an emphasis on security in wired, wireless, <strong>and</strong> VoIP networks. His<br />

that has support for IPv6 <strong>and</strong> serial port (either RS-232 port or your supplied 30-year involvement in the computer industry includes specific concentration in the<br />

USB-to-RS-232 adapter) capability in order to participate in these labs. internetworking sphere for over 22 of those years.<br />

A working knowledge of IPv6 is helpful but not required, as lab configurations will<br />

be fully detailed.<br />

LIMITED TO 24 REGISTERED PARTICIPANTS<br />

2:15 pm – 2:30 pm<br />

2:30 pm - 4:30 pm<br />

Building an IPv6 Network - Part Two<br />

Continuation of part one.<br />

BREAK<br />

Instructor: Jeff Carrell, Network Systems <strong>and</strong> Security Consultant<br />

See above.<br />

WEDNESDAY, June 15th<br />

Building an IPv6 Network - Part One<br />

See above.<br />

9:00 am - 10:30 am<br />

LIMITED TO 24 REGISTERED PARTICIPANTS<br />

Instructor: Jeff Carrell, Network Systems <strong>and</strong> Security Consultant<br />

See above.<br />

10:30 am - 10:45 am<br />

10:45 am - 12:15 pm<br />

Building an IPv6 Network - Part Two<br />

See above.<br />

BREAK<br />

Instructor: Jeff Carrell, Network Systems <strong>and</strong> Security Consultant<br />

See above.<br />

THURSDAY, June 16th<br />

Building an IPv6 Network - Part One<br />

See above.<br />

9:00 am - 10:30 am<br />

LIMITED TO 24 REGISTERED PARTICIPANTS<br />

Instructor: Jeff Carrell, Network Systems <strong>and</strong> Security Consultant<br />

See above.<br />

10:30 am - 10:45 am<br />

10:45 am - 12:15 pm<br />

Building an IPv6 Network - Part Two<br />

See above.<br />

BREAK<br />

Instructor: Jeff Carrell, Network Systems <strong>and</strong> Security Consultant<br />

See above.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!