In reverse, it is common for a computer to log in to a mobile phone, at which time SSH protocol is required for encrypted login. There are two users root&mobile for login, and root is usually used for login because of higher permissions

For the first time login

The root permission is higher than the mobile permission

Openssh is used

Intermediate attack

Place an intermediate attack

USB login

Hit a shell

Frida hit a shell

Manual hit a shell