Current command:
hf mfdes detect --help
Detect key type and tries to find one from the list. usage: hf mfdes detect [-hav] [-n <dec>] [-t <DES|2TDEA|3TDEA|AES>] [-k <hex>] [--kdf <none|AN10922|gallagher>] options: -h, --help This help -a, --apdu Show APDU requests and responses -v, --verbose Verbose output -n, --keyno <dec> Key number -t, --algo <DES|2TDEA|3TDEA|AES> Crypt algo -k, --key <hex> Key for authenticate (HEX 8(DES), 16(2TDEA or AES) or 24(3TDEA) bytes) --kdf <none|AN10922|gallagher> Key Derivation Function (KDF) -i, --kdfi <hex> KDF input (1-31 hex bytes) -m, --cmode <plain|mac|encrypt> Communicaton mode -c, --ccset <native|niso|iso> Communicaton command set --schann <d40|ev1|ev2|lrp> Secure channel --aid <hex> Application ID (3 hex bytes, big endian) --isoid <hex> Application ISO ID (ISO DF ID) (2 hex bytes, big endian). --dict <fn> Dictionary file name with keys --save Save found key and parameters to defaults examples/notes: hf mfdes detect -> detect key 0 from PICC level hf mfdes detect --schann d40 -> detect key 0 from PICC level via secure channel D40 hf mfdes detect --dict mfdes_default_keys -> detect key 0 from PICC level with help of the standard dictionary hf mfdes detect --aid 123456 -n 2 --save -> detect key 2 from app 123456 and if succeed - save params to defaults (`default` command) hf mfdes detect --isoid df01 --save -> detect key 0 and save to defaults with card in the LRP mode