HTTPS is encrypted end‑to‑end. To inspect TLS payloads in ProxyHawk, you install a local Certificate Authority (CA) and selectively decrypt hosts you choose.
On this page
ProxyHawk generates a self‑signed root CA (often labeled Proxy Hawk CA in Keychain). You export it from the app (PEM/DER) and trust it on:
ProxyHawk supports two strategies (similar to other desktop proxies):
| Mode | Behavior |
|---|---|
| Decrypt only these hosts (recommended) | Only hosts matching your patterns are MITM‑decrypted. Other HTTPS stays as a CONNECT tunnel (encrypted pass‑through). Safer for unrelated apps. |
| Decrypt all except… | Broad decryption with explicit exclusions (e.g. streaming or banking hosts you add). Use when you mostly want full visibility. |
You can add patterns from Settings → SSL proxying or from a traffic row (e.g. enable SSL proxying for this host).
Many mobile and desktop apps pin server certificates or public keys. If pinning is enforced, the client will refuse the connection when the proxy presents its MITM certificate—even if the Proxy Hawk CA is trusted at the OS level.
When you finish testing: delete Proxy Hawk CA from Keychain / device trust settings, and remove any installed profiles. Rotate the CA in ProxyHawk if you suspect the private key could have been exposed.