well to help you out there is some sorcery we can perform to further pivot inside the network possibly going from a low level user to root access with admin privileges.
Well thanks to +Rob Fuller aka @mubix who has put together some advanced post exploit techniques which amounts to shear awesomeness from the command line simply enter.
git clone https://github.com/mubix/post-exploitation-wiki.git
[this will download and create a folder called post-exploitation-wiki in whatever directory you run the above command from]
congratulations - you know have access to some really useful stuff for example
- useful commands (how do i see whose logged in again)
- important file locations (where are those pesky passwords stored)
- all kinds of other shit
- I'm sure you get the hint