I am performing a MITM attack against my own network using bettercap and https proxy. On my client-side I use the Google Chrome browser and navigate to https://webs.com At the same time I use a script that analyzes client-side TLS security parameters.
Bettercap presents its certificate to the client-server connection and I accept the certificate warning (just for testing). When I see the result of the script which analyzes the client-side TLS security parameters, the parameters chosen between the client and the server have a strong security grade. How is this possible that even though a MITM attack has succeeded in injecting his certificate, the patameters are still secure between a client and a server?