Intercept HTTPS Network Traffic from WatchOS
This mini-blog would demonstrate how to intercept network Traffic from the WatchOS app.
WatchOS Sample app
Fortunately, from WatchOS 5 and 6, it's straightforward to intercept HTTP/HTTPS network traffic from your WatchOS applications by using Proxyman app.
To get started, let download a WatchOS example app, which is already integrated with an Alamofire Framework.
Then, open the
watchOS Example.xcodeproj project with Xcode. At this time, it's Xcode 12.5.1.
Select Watch OS Example WatchKit app target -> Apple Watch Series 6.
Then, starting the app.
As soon as you click the "Perform Request" button, it will make a GET Request to the httpbin.org server.
Intercept with Proxyman
Let open Proxyman app and install the certificate to Watch OS Simulator.
Please navigate to Certificate menu -> Install Certificate for iOS -> Simulator.
Then following all steps and make sure they are all ticked.
It's ready to intercept traffic with Proxyman. Let click on the "Perform Request" button on the Watch OS.
Tada! You can see the new request/response in Proxyman.
To capture traffic from a physical WatchOS device, it's a little tricky. You have to install and trust the certificate on your host iOS Devices and set up WatchOS to proxy traffic to the iOS device. We will write a tutorial on how to achieve it in the next blog.
Proxyman is a high-performance Web Debugging Proxy app, which enables developers to view HTTP/HTTPS requests from apps and domains on macOS, iOS device, iOS Simulator, and Android devices and emulators.
Get it at https://proxyman.io