Linux Local Privilege Escalation - Skills Assessment,Need help

I have answered five questions and completed this module, but it contains a method that does not use ssh credentials, can anyone give me some ideas? Or does this approach require knowledge of other modules within the Academy?

Note: There is a way to obtain a shell on the box instead of using the SSH credentials if you would like to make the scenario more challenging. This is optional and does not award more points or count towards completion.

I mean nothing much you can say here just try expoiting vulnerabilities. Check other open ports and look for flaws

ok,thank you~