Nmap result is the below 🙂

I meet new ports at my OSCP process.
I search at the internet how I can abuse the vulnerability .

I find which driver can I mount it and I find

I mount it.


I create a user that it can open the directory.


I create a php file to use webshell.


It success and I get the reverse shell.


To be countinued to privesc :).