Abstract: In this article we will discuss the exploitation of Android devices and for the purpose of the study we will use an emulator as well as Kali Linux and its embedded platforms Metasploit ...