so, just a question.
can i use arp poisoning in a wireless lan?
precisely, i have connected my pc to the router wireless.
i obtain always "couldn't arp for host ..." error.
for example:
192.168.1.71 my wlan1 pc card
192.168.1.254 my router.
192.168.1.76 pc target
i type arpspoof -i wlan1 -t 192.168.71 192.168.1.76, then i would like to type: arpspoof -i wlan1 -t 192.168.254 192.168.1.71
if i set my wlan1 card in monitor mode, arpspoof replies with "unknown physical layer type" error.
else if it replies with "could't arp for host".
thanks
6 Responses
Victim: 192.168.1.76
Router: 192.168.1.254
Attacker NIC: wlan0
> arpspoof -i wlan0 -t <victim> -r <router>
> arpspoof -i wlan0 -t 192.168.1.76 -r 192.168.1.254
Setting the NIC to monitor mode won't help.
# Sergeant
Why are you entering your IP address as the target? You are not involved in this attack apart from establishing it. The correct syntax is:
arpspoof -i <interface> -t <target> <gateway>
You should learn how ARP spoofing works before using tools that initiate this sort of attack and not understanding the happenings.
TRT
it worked finally , i was using ( arpspoof -i wlan0 -t <victim> -r <router>) but it didnt work for me .
thx a lot
router's ip 192.168.2.254 ?? O.o
thanks so much
how about if your kali is on a VM and you are testing your windows 10 host? I understand you will be using the target (host) machine ip and the router gateway? from kali, I issue route -n but it gives me a different router gateway than my windows 10 host
Share Your Thoughts