I tried to dnsspoof the victim machine for say "www.imdb.com" (with the help of setoolkit and ettercap). But the site is ssl https, so I read here that dnsspoof won't work for https sites. As quoted in the link provided :
As part of the SSL handshake process, your server will need to send a valid certificate for securesite.com which contains the public key.
At this point, you have 2 options.
1) Send the legitimate certificate. This will check out since the certificate is signed by a trusted CA. The client will then encrypt the master secret using the public key. It breaks down at this point, because without the private key, you cannot decrypt the master secret and thus you can't finish the connection setup.
Is there a way to "send the legitimate certificate" ?