I think digip does not understand.
I mean the onboard wifi. And it's not the attacking wireless interface, it's just the one used for bridging.
Forget about arpspoof or any attack.
What I mean, is that when using the onboard wireless interface as the vbox/vmware bridged interface, then when I'm "arp -a" from another physical machine (on the same network), I see that the MAC of host PC (on which kali vm is) AND the kali VM are same (equals to the host PC MAC).