@@ -44,7 +44,8 @@ def initialize(info = {})
4444 OptBool . new ( 'SSL' , [ true , "Negotiate SSL for outgoing connections" , true ] ) ,
4545 OptString . new ( 'USERNAME' , [ true , "A specific username to authenticate as" , 'clientless' ] ) ,
4646 OptString . new ( 'PASSWORD' , [ true , "A specific password to authenticate with" , 'clientless' ] ) ,
47- OptString . new ( 'GROUP' , [ true , "A specific VPN group to use" , 'clientless' ] )
47+ OptString . new ( 'GROUP' , [ true , "A specific VPN group to use" , 'clientless' ] ) ,
48+ OptInt . new ( 'RETRIES' , [ true , 'The number of exploit attempts to make' , 10 ] )
4849 ] , self . class
4950 )
5051
@@ -248,9 +249,9 @@ def exploit
248249 validate_cisco_ssl_vpn ( )
249250
250251 # This is crude, but I've found this to be somewhat
251- # interimittent based on session, so we'll just try
252- # 10 times.
253- 10 . times do |i |
252+ # interimittent based on session, so we'll just retry
253+ # 'X' times.
254+ datastore [ 'RETRIES' ] . times do |i |
254255 print_good ( "#{ peer } - Exploit Attempt ##{ i } " )
255256
256257 # Authenticate to SSL VPN and get session cookie
0 commit comments