This is the argument that describes our input network address. We have
already learned about finding the IP address of our system using the
ifconfig tool. The IP address is essential because we need to make a regular
connection between the host and the victim so that the data can be
transferred.
c) LPORT
Just like the previous one, this describes the port that we are willing to offer
to this Metasploit program so that the victim app can send us data and other
sensitive information.
d) R
This is where the apk format should be selected using the options. We are
dealing with raw format information so this should be mentioned. If you are
dealing with system software's execution files should be selected.
e) Location
This argument helps us to select the apk that we are referring to. You can
simply give the location so that the Metasploit can start making it as an
exploit. But before this process, we need to make some certificate
installations so that everything runs in perfect. We will learn about this
process in detail in this section.