ARP Spoofing does not update ARP Table


i’m currently trying to do ARP-Spoofing / ARP-Poisoning with Kali Linux in Virtualbox in order to check the security of the Network of my company. I’m currently doing a little pentest, therefore i am allowed to do this. I’m trying to gain a man-in-the-middle position between a Laptop and my router. Therefore, let’s say i’m using the following:

  • Kali Linux in Virtualbox with external USB Wifi Adapter IP: 192.0.0.3 | MAC: CC:CC:CC:CC:CC:CC

  • Target-Laptop using Windows 10 IP: 192.0.0.2 | MAC: BB:BB:BB:BB:BB:BB

  • Default Gateway IP: 192.0.0.1 | MAC: AA:AA:AA:AA:AA:AA

Therefore i tried a few options for arp spoofing, for example the MitM-Framework, ettercap and arpspoof. When i capture the network traffic on wireshark, i can see the ARP-Packets, saying: 192.0.0.2 is at CC:CC:CC:CC:CC:CC and also: 192.0.0.1 (router) is at CC:CC:CC:CC:CC:CC

But when im looking up the ARP-Table on my target with arp -a , there is still the right MAC-Adress for the default gateway.

For example i tried:

  1. sysctl -w net.ipv4.ip_forward=1
  2. arpspoof -i wlan0 -t 192.0.0.2 192.0.0.1
  3. arpspoof -i wlan0 -t 192.0.0.1 192.0.0.2

Are there any suggestions what else i can try to fix my problem? Thanks in advantage 🙂