I'm currently trying to do ARP-Spoofing / ARP-Poisoning with Kali Linux in Virtualbox in order to check the security of the Network of my company. I'm currently doing a little pentest, therefore I am allowed to do this. I'm trying to gain a man-in-the-middle position between a Laptop and my router. Therefore, let's say I'm using the following:
Kali Linux in Virtualbox with external USB Wifi Adapter
IP: 192.0.0.3 | MAC: CC:CC:CC:CC:CC:CC
Target-Laptop using Windows 10
IP: 192.0.0.2 | MAC: BB:BB:BB:BB:BB:BB
Default Gateway
IP: 192.0.0.1 | MAC: AA:AA:AA:AA:AA:AA
Therefore I tried a few options for ARP spoofing, for example the MitM-Framework, ettercap and arpspoof.
When I capture the network traffic on Wireshark, I can see the ARP-Packets, saying:
192.0.0.2 is at CC:CC:CC:CC:CC:CC
and also:
192.0.0.1 (router) is at CC:CC:CC:CC:CC:CC
But when I'm looking up the ARP-Table on my target with arp -a
, there is still the right MAC-Address for the default gateway.
For example I tried:
sysctl -w net.ipv4.ip_forward=1
arpspoof -i wlan0 -t 192.0.0.2 192.0.0.1
arpspoof -i wlan0 -t 192.0.0.1 192.0.0.2
Are there any suggestions what else I can try to fix my problem?