First, setup the website clone using the social engineering toolkit
Configure the etter.conf file by setting the ec_uid and ec_gid into o and remove the “#” in the if you use iptables section.
Configure the etter.dns file to add the detik.com redirects so that if the victim’s search for detik.com, it will go to the attackers website.
Turn on ettercap and then do unified sniffing, choose the ‘eth0’ option and scan for hosts. After scanning for hosts, stop sniffing and set the victim’s IP as target1 and the gateway address as target2. Next, go to the mitm tab and do arp poisoning (use the sniff remote connections option). After that, go to the plugins, turn on dnsspoof and start sniffing
IP address of detik.com changes from the original IP address into the IP address of the attacker