Usually decrypting HTTPS traffic requires a MITM scenario involving certificates and/or deep packet inspection. Silent Signal recently shared a great writeup on how this can be accomplished using Burp Suite and a new extension that is available on their GitHub repository. This method can potentially save time while being less complex and invasive. Using certificates to MITM a HTTPS session requires the user to bypass their web browser security warnings which shouldn’t be necessary here.
Please check out the full writeup!