Demo: In the video above we use Burpsuit proxy in an attampt to bypass the SSL and capture the transmitted data. We configure the smartphone
to use the proxy and the proxy to listen to traffic comming from the device.
When this is done the proxy generates and presents to the client a self-signed (fake) certificate.
In the above example we can see that we are unable to see/capture any traffic and at some point the application throws an error, rejecting the
fake certificate.