We are assuming two test scenarios here: one is the Android-emulated device from Genymotion that has a Wi-Fi connection and other has LTE/3G/2G data services for the Internet. This will be exactly the same even in the real device.
Before we begin to configure the emulator for proxy, let's take a tour of the different types of proxy tools available, which we can use for our assessments, but these are not limited to the following:
Burp Proxy: The preferred proxy for a majority of penetration testers, it can be downloaded from https://portswigger.net/burp/download.html. There are two editions: one for commercial use and the other for free. Multiple options are available in the commercial edition, such as scanners, among other things.
Paros Proxy: This is an open source Java-based proxy that's especially designed to find the vulnerabilities in web applications. It can be downloaded from http://sourceforge.net/projects/paros/files/. Due to a lack of updates...