Writeup by n0tpresl3y for iForensics - iWiFi

forensics iOS

November 30, 2025

1 — Prepare the backup

Extract the backup archive:

tar -xf backup.tar.xz
cd backup

2 — Locate Wi‑Fi configuration files in Manifest.db

Use Manifest.db to avoid searching manually through thousands of hashed files. Open the database:

sqlite3 Manifest.db

Search for Wi‑Fi‑related paths:

SELECT fileID, relativePath FROM Files WHERE relativePath LIKE "%wifi%";

One of the relevant entries is:

0f/0fa75546343ba224c9fe55adc73e8fdedc1029c3

3 — Convert Wi‑Fi plist to XML

The file is a binary plist. Convert it to XML for readability:

plistutil -f xml -i 0f/0fa75546343ba224c9fe55adc73e8fdedc1029c3 -o wifi.xml

On macOS:

plutil -convert xml1 0f/0fa75546343ba224c9fe55adc73e8fdedc1029c3 -o wifi.xml

4 — Extract SSID & BSSID

Example structure found inside wifi.xml:

<key>SSID</key>
<string>FCSC</string>

<key>BSSID</key>
<string>66:20:95:6c:9b:37</string>

5 — Extract the iCloud account

To locate the iCloud account, search through files for email strings:

grep -r ".com" .

Relevant match after trying:

35/3563f4a234af8c67a8a6a664d5e70fa131739c2f

Inside this plist:

<plist version="1.0">
  <dict>
    <key>registration.savedAccountName</key>
    <string>robertswigert@icloud.com</string>
  </dict>
</plist>

Final Flag

FCSC{FCSC|66:20:95:6c:9b:37|robertswigert@icloud.com}