I recently started learning about wireless hacking, and I came up with an idea to prank my friends by doing a MITM attack and redirecting every request they make to a rickroll. My idea for the attack is to intercept all the HTTP requests and replace them with a request to the rickroll video. Since I am not actually trying to read the requests being sent, I think that this should also work with HTTPS. However, I couldn’t find any attacks similar to this other than maybe a DNS spoofing attack, but I ruled it out because most of the visited domains are stored in the local dns cache anyway. One way I attempted to get this to work is by arp spoofing my own network and using IP tables to redirect all traffic coming to port 80 to a local webserver I set up that will redirect them to the youtube video, however, for some reason, this didn’t work and the victim machine could no longer access the internet. It’s possible that I just didn’t use IP tables correctly. Anyway, does anyone have any idea of ways I could achieve this?