Member-only story
Easy Setup Charles Proxy to Intercept HTTPS traffic of Android Emulator
For Web or App development, typically you are required to debug and look into the HTTPS traffic of your applications. To intercept the traffic, you have to use the Man-in-the-middle technique to decrypt and encrypt between your application and the API endpoint.
Let’s us walkthrough in detail with Android Emulator …
A. Setup Android Emulator (in Android Studio)
You have to use the emulator system image without Play Store



New folder storing the emulator will be created at
%USERPROFILE%\.android\avd
B. Export Root Certificate
Save the Charles Root Certificate

Rename this “pem” file to android specific format certificate file.
You can use the openssl in Git Bash
openssl x509 -inform PEM -subject_hash_old -in charles.pem | head -1
name format as “<hash-value>” + “.0”
(simply concatenate “.0” as a string with the hash value string)
C. Start Emulator
Emulator Path in Windows
%LOCALAPPDATA%\Android\Sdk\emulator
cd %LOCALAPPDATA%\Android\Sdk\emulator emulator -avd Pixel_3a_XL_API_29 -writable-system -no-snapshot-load

D. Root & Push Root Certificates
ADB Path in Windows
%LOCALAPPDATA%\Android\Sdk\platform-tools
Execute the commands with the adb
- For Android Q and…