I work on a fresh Kali install running in a VM. I have an external Wi-Fi NIC used only by the VM (I try to not use the internet connection of the host).
The network is protected (hum) by WEP, with the following IP adresses :
- 192.168.2.117: the target
- 192.168.2.254: the gateway
- 192.168.2.116: the attacking station
I've tried the following steps:
echo 1 >  /proc/sys/net/ipv4/ip_forward
arpspoof -i wlan0 -t 192.168.2.117 -r 192.168.2.254  # I also tried without the flag `r`
arpspoof -i wlan0 -t 192.168.2.254 192.168.2.117  # I also tried without this line
The ARP table of the target is modified, and on the attacking station I see all the requests from .117 (on Wireshark). But there is no response from the gateway; I even doubt than the attacking station forward the requests to the gateway. My iptables is totally empty and the policy is on ACCEPT everywhere.
So where I am wrong, and how enable the forwarding of the requets?
 
     
    