This is a flow that my friend and I worked on, it represent the options that a pentest can have through a mobile pentest and how to deal with different scenario. In the flow you can see how to get started our root phone on couple options and different types of tools to attack the mobile application