This document discusses using self-signed certificates to impersonate SSL connections. It shows how the Metasploit tool can be used to copy a certificate from a remote host and export it locally in under 15 seconds. While self-signed certificates are easy to generate, they may raise warnings for users and can be detected by technicians as invalid unless provided with a fabricated explanation.