Sort:  

I believe that this post is more about the general information and could be suitable for a person that does not know metasploit.

The information about installation is written in the documentation quite well and your post would benefit from including the links for other platforms even though you show it only for one distro.

You mention some of the commands but I feel that it is not really explained what we can do with them.

There are some passages where you repeat yourself or it is not clearly written.

[...] some information about the target system and the target system [...]

In general, when selecting an payload, an appropriate payload must be selected for the exploit.

In other words, when Windows wants to perform an attack on a system, an appropriate exploit is selected for that system and a payload to be executed after the exploit is selected.

It could be better if you were able to mention what the following part is going to be about. Afterall, you want to write a series.

Overall, I think that this post is not suitable for the reward right now.

Thank you for the detailed review @espoem