I know that certificate validation is done by browser by validating the signature on the certificate adnd verifying it has been signed by trusted CA.
But what if I want to make man in the middle attach, by changing the server certificate sent to the client, send my fake certificate with my public key so that I can decrypt the traffic sent to me by the client, and copy-paste the original certificate signature "which had been signed by a trusted CA"?
Is the original server public key is used by the CA to generate it's signature?
Hopefully, I need some detailed material to understand about the entire public cryptography and SSl process
Thanks