Make your own signature with your fake data and send fake data with a fake signature (but with the correct certificate) to the server / client.
The problem is that the recipient will then look at the fake signature and see that it does not match the certificate of the real sender.
You can create signatures corresponding to this certificate when you have the correct private key for this certificate (even if the certificate itself is public, that is, the magic of asymmetric cryptography). This secret key is kept secret by the certificate holder (original sender of the message).
-- .
, ( ), , , .
, - , .