Hi! I am new to ettercap (although I am not new to security, and I am not a kiddy ).
Because I am working on a mac I enabled the "quick and dirty fix" in etter.conf.
I followed the standard tutorials to spoof arp (Added roter and victim to target 1 and 2, arp poisoning, start sniffing).
What I expect: My victim is able to browse HTTP ordinarily.
What I get:
The arp is spoofed correctly (the cache got my attacker's mac instead of the router's), but I get request timeouts when pinging my router. I cannot open web pages anymore, nothing loads.
Although the connections tab lists the victim's connections correctly.
First I thought I needed a software that listens on my attacker in order to tunnel the traffic to the router (man in the middle). I found a thread saying it should listen on 8080. But after watching a video I guess that's already included when I select ARP poisoning?
What point am I missing?
I hope I provided enough information. Thanks for any help!