Intercept HTTPS Network Traffic from WatchOS

Cover Image for Intercept HTTPS Network Traffic from WatchOS

This mini-blog would demonstrate how to intercept network Traffic from the WatchOS app.

WatchOS Sample app

Fortunately, from WatchOS 5 and 6, it's straightforward to intercept HTTP/HTTPS network traffic from your WatchOS applications by using Proxyman app.

To get started, let download a WatchOS example app, which is already integrated with an Alamofire Framework.

Then, open the watchOS Example.xcodeproj project with Xcode. At this time, it's Xcode 12.5.1.

Select Watch OS Example WatchKit app target -> Apple Watch Series 6. Select watch os target

Then, starting the app.

Watch OS sample app with Proxyman

As soon as you click the "Perform Request" button, it will make a GET Request to the httpbin.org server.

Intercept with Proxyman

Let open Proxyman app and install the certificate to Watch OS Simulator.

Please navigate to Certificate menu -> Install Certificate for iOS -> Simulator.

Then following all steps and make sure they are all ticked.

Install certificate to watch OS

It's ready to intercept traffic with Proxyman. Let click on the "Perform Request" button on the Watch OS.

Tada! You can see the new request/response in Proxyman.

Capture traffic watchOS with Proxyman

What's next

To capture traffic from a physical WatchOS device, it's a little tricky. You have to install and trust the certificate on your host iOS Devices and set up WatchOS to proxy traffic to the iOS device. We will write a tutorial on how to achieve it in the next blog.


Proxyman is a high-performance macOS app, which enables developers to capture HTTPs traffic on iOS device, iOS Simulator and Android devices.

Get it at https://proxyman.io

Noah Tran
Noah Tran