rapid7/metasploit-framework

View on GitHub
external/source/exploits/IE11SandboxEscapes/CVE-2014-0268/dllmain.cpp

Summary

Maintainability
Test Coverage
// dllmain.cpp : Defines the entry point for the DLL application.
#include "stdafx.h"

DWORD CALLBACK ExploitThread(LPVOID hModule);

BOOL APIENTRY DllMain( HMODULE hModule,
                       DWORD  ul_reason_for_call,
                       LPVOID lpReserved
                     )
{
    switch (ul_reason_for_call)
    {
    case DLL_PROCESS_ATTACH:
        CreateThread(nullptr, 0, ExploitThread, hModule, 0, 0);
        break;
    case DLL_THREAD_ATTACH:
    case DLL_THREAD_DETACH:
    case DLL_PROCESS_DETACH:
        break;
    }
    return TRUE;
}