ARP Spoofing does not update ARP Table

i’m currently trying to do ARP-Spoofing / ARP-Poisoning with Kali Linux in Virtualbox in order to check the security of the Network of my company. I’m currently doing a little pentest, therefore i am allowed to do this. I’m trying to gain a man-in-the-middle position between a Laptop and my router. Therefore, let’s say i’m using the following:

  • Kali Linux in Virtualbox with external USB Wifi Adapter IP: | MAC: CC:CC:CC:CC:CC:CC

  • Target-Laptop using Windows 10 IP: | MAC: BB:BB:BB:BB:BB:BB

  • Default Gateway IP: | MAC: AA:AA:AA:AA:AA:AA

Therefore i tried a few options for arp spoofing, for example the MitM-Framework, ettercap and arpspoof. When i capture the network traffic on wireshark, i can see the ARP-Packets, saying: is at CC:CC:CC:CC:CC:CC and also: (router) is at CC:CC:CC:CC:CC:CC

But when im looking up the ARP-Table on my target with arp -a , there is still the right MAC-Adress for the default gateway.

For example i tried:

  1. sysctl -w net.ipv4.ip_forward=1
  2. arpspoof -i wlan0 -t
  3. arpspoof -i wlan0 -t

Are there any suggestions what else i can try to fix my problem? Thanks in advantage 🙂