1. Demonstrate entire process with the machine.
2. Use Burp to manipulate response.
3. Use ssh2john that transforms ssh private key to john format hash for cracking.
4. Use Linpeas.sh to make local enumeration
5. Utilize cron job to escalate privilege