0

So I'm learning to run MITM attacks on my own WiFi network but I seem to be running into an issue. I'm following this tutorial.

The process is simple and I'm running the attack from my Ubuntu laptop. I first enable IP forwarding using echo > 1 /proc/sys/net/ipv4/ip_config. The command runs without an issue. Next up is setting up the ARP Spoof, for which I run these commands in separate terminals.

arpspoof -i eno1 -t 192.168.0.101 -r 192.168.0.1
arpspoof -i eno1 -t 192.168.0.1 192.168.0.101

192.168.0.101 is my Windows laptop, in this case, the target.

192.168.0.1 is my router's default gateway.

The tutorial above says that I have to mention the attacking machine's (Ubuntu laptop's) IP in the -r flag, but that keeps giving me a couldn't arp for spoof host [Ubuntu machine's IP]. I Googled around and found that you have to mention the default gateway (the router's IP) there, so I did and the arpspoof command ran fine.

However, as soon as I run the arpspoof command, the target machine loses internet access and sometimes drops the WiFi connection altogether. Not to mention I am not able to capture any HTTP packets on Wireshark.

Can anyone point out what I'm doing wrong?

I've tried the solution pointed out in this answer, didn't work for me.

0 Answers0