#
hcxlabtool
This is an awesome tool for doing WPA3 downgrade attacks! Booyah!
Referenced from: this GitHub discusson
TIP
You might just want to try using pentesting/Wifi/dragonshift as an alternative to this tool.
#
Install pre-reqs and compile
git clone https://github.com/ZerBea/wifi_laboratory.git ~/wifilab
cd ~/wifilab
sudo apt install build-essential git libpcap-dev -y
make
#
Attack a list of APs to see if they're vulnerable to a WPA3>WPA2 downgrade attack
sudo ./hcxlabtool p phy0 s 15 e ../wifi_laboratory-main/ap.list f 23b
Where:
p phy0is the name of the physical interfaces 15is the stay time in seconds`e ap.listis the list of AP names to attackf 23bis the channel and band to attack
DANGER
I'm not sure the syntax above actually works. It seems this tool kind of went into "shields up" mode. The repo says "Do not report issues or feature requests."
Below is the old command syntax I had up for a long time, but at the time of this page's update (2025-12-04) it looks like the syntax has totally changed so I don't think the info below is relevant:
sudo hcxlabtool --rds=1 --essidlist list-of-wpa3-aps.list -t 15 -c23b
#
Additional resources
More information about this attack here. We also did a YouTube video on this downgrade attack here.