Enable IP forwarding to prevent packets from being dropped while flowing through Kali echo 1 > /proc/sys/net/ipv4/ip_forward
Then repeat the attack as shown in the lecture. Now the above error message mean that the code injector program can’t find/access the TCP layer to inject the JS code into the target browser web page. Can you show me the complete code of the program? Maybe you’re missing something tiny
And does the target gateway mac address changes to Kali’s mac when you run the ARP spoof program in another terminal window after you apply the IP tables rules?