Introduction
In this challenge, you will step into the role of a cybersecurity analyst tasked with investigating potential data exfiltration through DNS queries. Your mission is to analyze network traffic captured in a pcapng file to identify all queried domain names that might reveal communication with command and control servers.
You will use tshark, the command-line network protocol analyzer, to extract DNS query names from the capture file. The challenge requires you to filter for DNS traffic, extract query names, sort them alphabetically, remove duplicates, and save the results to a file for further analysis. This practical exercise will enhance your skills in network traffic analysis and help you detect suspicious DNS activities that could indicate malicious behavior.