SharkFest is an annual educational conference focused on sharing knowledge, experience and best practices among members of the Wireshark global developer and user communities.
Become a member and get access to unreleased SharkFest videos from recent conferences! Your memberships directly support the Wireshark Foundation and the development of Wireshark.
for screen recordings/streams, presenters should consider whether they have appropriate zoom tools and legibly sized text. if not, they should lower the resolution as much as possible without compromising layout and functionality. if you are an organizer of presenters, prompt them for a ten minute talk before to sort out stuff like this.
To effectively troubleshoot network issues using Wireshark during the SF22US conference, you should start by understanding your network layout and capturing traffic with a broad scope. Apply filters to narrow down to specific issues and capture traffic at strategic points. Familiarize yourself with key protocols like TCP, HTTP, and DNS. This process will help you analyze network traffic, identify problems, and troubleshoot effectively.
So the dissallowed ip range, on that subnet, no IP address were allowed .... /24 tell everything .. Unless you whitelisting the client IP address .. am i right ? Lets say i want to make a whitelisting option, we should dissallowed by /24, and allow just 1 IP (must be static), from the client .. And the topology is Internal Network for the VM's ... right ? and Wireshark is good for digging network artifact, but overall your video is clearly understandable ... thank you sir ..
I am getting the following error. Basically I am trying to search a string inside the packet. if 'gtpv2' in packet: # Access GTPv2 protocol fields gtpv2_packet = packet.gtpv2 if 'create_session_request' in gtpv2_packet: print('Present') Error : Error processing packet: argument of type 'XmlLayer' is not iterable please help on this.
Great job explaining. Thank you! Can you identify the supported roaming protocols by a STA in packet headers or payloads? Or is there a way to identify this information via pcap?