@@ -44,7 +44,8 @@ def initialize(info = {})
44
44
OptBool . new ( 'SSL' , [ true , "Negotiate SSL for outgoing connections" , true ] ) ,
45
45
OptString . new ( 'USERNAME' , [ true , "A specific username to authenticate as" , 'clientless' ] ) ,
46
46
OptString . new ( 'PASSWORD' , [ true , "A specific password to authenticate with" , 'clientless' ] ) ,
47
- OptString . new ( 'GROUP' , [ true , "A specific VPN group to use" , 'clientless' ] )
47
+ OptString . new ( 'GROUP' , [ true , "A specific VPN group to use" , 'clientless' ] ) ,
48
+ OptInt . new ( 'RETRIES' , [ true , 'The number of exploit attempts to make' , 10 ] )
48
49
] , self . class
49
50
)
50
51
@@ -248,9 +249,9 @@ def exploit
248
249
validate_cisco_ssl_vpn ( )
249
250
250
251
# This is crude, but I've found this to be somewhat
251
- # interimittent based on session, so we'll just try
252
- # 10 times.
253
- 10 . times do |i |
252
+ # interimittent based on session, so we'll just retry
253
+ # 'X' times.
254
+ datastore [ 'RETRIES' ] . times do |i |
254
255
print_good ( "#{ peer } - Exploit Attempt ##{ i } " )
255
256
256
257
# Authenticate to SSL VPN and get session cookie
0 commit comments