Shells & Payloads - Infiltering Unix/Linux

Hi, I’m attempting to answer the final question in the Infiltering Unix/Linux section of the Shells & Payloads module. I’ve followed what I believe are the necessary steps but I’m unable to catch a meterpreter shell? The exploit completes but no session created. Any pointers, please?

Did you manage to get the call back?

Hi, I did. The only thing I did different was use my Parrot VM, not the Pwnbox.