Please run the following commands to flush all IP tables rules before running the code injector.
iptables --table nat --flush
iptables --table nat --delete-chain
iptables -P FORWARD ACCEPT
Enable IP forwarding to prevent packets from being dropped while flowing through Kali
echo 1 > /proc/sys/net/ipv4/ip_forward
Then repeat the attack as shown in the lecture. Now the above error message mean that the code injector program can’t find/access the TCP layer to inject the JS code into the target browser web page. Can you show me the complete code of the program? Maybe you’re missing something tiny
And does the target gateway mac address changes to Kali’s mac when you run the ARP spoof program in another terminal window after you apply the IP tables rules?