diff --git a/modules/exploits/linux/local/vmware_alsa_config.rb b/modules/exploits/linux/local/vmware_alsa_config.rb index 31f23ede30..e11a3a18d7 100644 --- a/modules/exploits/linux/local/vmware_alsa_config.rb +++ b/modules/exploits/linux/local/vmware_alsa_config.rb @@ -46,6 +46,7 @@ class MetasploitModule < Msf::Exploit::Local 'DefaultOptions' => { 'Payload' => 'linux/x64/meterpreter_reverse_tcp', + 'WfsDelay' => 15, 'PrependFork' => true }, 'DefaultTarget' => 1, @@ -212,7 +213,7 @@ hook_func.pulse_load_if_running { print_status "Launching VMware Player..." cmd_exec "vmplayer #{@base_dir}/#{fname}.vmx" - Rex.sleep 5 # give vmplayer some time to launch + Rex.sleep 0.5 end def cleanup