Running ARP Spoof disables internet access on target machine, doesn’t intercept traffic as well

So I’m learning to run MITM attacks on my own WiFi network but I seem to be running into an issue. I’m following this tutorial.
The process is simple and I’m running the attack from my Ubuntu laptop. I first enable IP forwarding using echo… Continue reading Running ARP Spoof disables internet access on target machine, doesn’t intercept traffic as well

ARP Spoofing: Replying to requests meant for spoofed IP, while also being able to communicate with spoofed IP

I am simulating an ARP Spoofing attack on a local network. I have an Attacker machine on Linux, a web server, and a Victim machine which is trying to access the web server. I am successfully able to spoof the IP of the web server, and I am… Continue reading ARP Spoofing: Replying to requests meant for spoofed IP, while also being able to communicate with spoofed IP

How to redirect ettercap or arp poisoned traffic to burp suite or mitmproxy?

I have poisoned the target using Ettercap and redirected the traffic to my IP address. The question is, how to intercept and modify this traffic using burp suite or mitm proxy?
The only condition is, I cannot do any client-side modificatio… Continue reading How to redirect ettercap or arp poisoned traffic to burp suite or mitmproxy?