Keep it simple, read your scan output. You’ll find something that helps analyze everything you’re seeing initially. Once you find the first big clue use that information to auth and then normal enumeration should grant you a user shell. Remember to read exploit code!
As mentioned earlier, the vegetable will lead you to success. Make sure to read every line. Once a certain ability sticks out click the associated link and the example will be right in front of you.
Feel free to PM for a nudge.