Just putting this out there, I dont think it is due to incorrect commands, yet I have seen it happen on several occasions, so your advice / information greatly appreciated.

After having created and succesfully obtained a shell or a meterpreter reverse_tcp session, I have noticed that when closing the exploit and trying to start it up again, it seems to (on occasion) neglect connections.

So it basically hangs at the stage of ;

msf exploit(handler) > exploit
Started reverse handler on 192.168.1.105:5632
Starting the payload handler...

This after having being able to use it before.

If I then reboot backtrack, re-issue the same commands to listen for the incoming connection then
all is fine and dandy and the shell / meterpreter works as it should, accepting connections.
So I must be missing something, just not sure where to look.

Any help greatly appreciated.