This paper explores the ease of us of standard Kali Linux tools to analyse network activity, and conduct a series of man-in-the-middle attacks within a wireless local area network. These tests primarily include ARP poisoning, deauthentication attacks and finally cloning a rogue access point to carry out further social engineering attacks and web browser control (with BeEF). Lastly this paper explores the usage of VPNs to protect a user’s privacy as it is difficult to prevent packet sniffing and man-in-the-middle attacks outright