In our experiments, we orchestrated a man-in-the-middle attack, replay attack and combination of dos and replay attacks. For this purpose, we used packet capturing tools for sniffing traffic and emulating a man in the middle. We were able to successfully thwart replay attacks and MITM attacks but was not able to neutralize the combination of dos + replay attack due to time constraints.