After explotation, One of the way to keep control over victim is to retrieve his/her Google/cloud password.
We might have to write code to retrieve password and to synchronise everything photo/video/audio/data to Google/cloud account.
We can also change the settings of victim email, and can get the copy of email he/she received.
The only difficult thing I think is, how to write code to get password and
** How to write code to synchronise everything like photo/video/audio/data to Google/cloud account.**
After that we have full control over android after explotation by Kali Linux+metasploit+payload+RAT+social engineering+reverse engineering.
I am very new to eH, so ignore my stupidity.