Hello, I would like to know how the socket data (1.txt, 4.txt, 7.txt,...) that triggers the vulnerability are constructed? Looking forward to your reply!