Android Device Access and Exploitation using Metasploit Kali for Cybersecurity - Tutorial Summary