PropertyValue
http://www.w3.org/1999/02/22-rdf-syntax-ns#type
http://www.w3.org/ns/prov#value
  • As we can see in above, after connected to the 2002 port of the exploit target, we can get an interactive shell, with the id: apache, we can do ls, cd, and any other command we want.
http://www.w3.org/ns/prov#wasQuotedFrom
  • sans.org