Started Reverse Tcp Handler On

No session opened , Keeps constant on ( Started reverse TCP handler on 192.168.x.xx4444

Started Reverse Tcp Handler On. I get this on running with verbose mode on. Web msf5 exploit(windows/smb/ms17_010_eternalblue) > exploit [*] started reverse tcp handler.

No session opened , Keeps constant on ( Started reverse TCP handler on 192.168.x.xx4444
No session opened , Keeps constant on ( Started reverse TCP handler on 192.168.x.xx4444

When using exploit the message [*] started reverse tcp on handler (my ip):4444 is. Web exploit completed but no session was created. I get this on running with verbose mode on. Web msf5 exploit(windows/smb/ms17_010_eternalblue) > exploit [*] started reverse tcp handler. Web msf exploit(windows/local/ppr_flatten_rec) > set session 1 session => 1 msf. Web this looks like intend function.

Web msf exploit(windows/local/ppr_flatten_rec) > set session 1 session => 1 msf. When using exploit the message [*] started reverse tcp on handler (my ip):4444 is. Web msf5 exploit(windows/smb/ms17_010_eternalblue) > exploit [*] started reverse tcp handler. Web msf exploit(windows/local/ppr_flatten_rec) > set session 1 session => 1 msf. I get this on running with verbose mode on. Web this looks like intend function. Web exploit completed but no session was created.