The man in the middle proxy, like other answers, is a good solution if you want to see only HTTP / HTTPS traffic. Burp Suite is pretty good. However, it can be painful to set up. I do not know how you could convince the simulator to talk to him. You may need to install the proxy server on your local Mac into your proxy server instance so that it can intercept, since the simulator will use the local Mac environment.
The best solution for batch sniffing (although it only works for real iOS devices, not a simulator), I found using rvictl . This blog post has a good entry. Basically you:
rvictl -s <iphone-uid-from-xcode-organizer>
Then you sniff the interface that it creates using Wireshark (or your favorite tool), and when you finish working with the interface:
rvictl -x <iphone-uid-from-xcode-organizer>
This is good, because if you want to pack sniff on a simulator, you have to wade through traffic to your local Mac, but rvictl creates a virtual interface that shows you traffic from your iOS device. 'connected to your USB port.
mpontillo Jun 21 2018-12-12T00: 00Z
source share