I’m trying to perform a MiTM attack on a local network connected device. I configured the iptables to route the incoming traffic to port 443 and port 80 so it can be captured by the Burp Suite. However when i’m performing ARP poisoning using ettercap (as arpspoof is not available in KALI 2020) wireshark can capture the packets but burp can’t be able to intercept the packets.
I followed this tutorial… https://www.pentestgeek.com/penetration-testing/credential-harvesting-via-mitm-burp-suite-tutorial
But it’s not helping me anymore as arpspoof is deprecated.