read remote file without password

We have old Linux machine in remote office and I need to read one file in /user/leasing.txt . No passwords available- admin changed them before leaving :(

nmap output:

1080/tcp closed socks

2222/tcp open   ssh                OpenSSH 5.3 (protocol 2.0)

| ssh-hostkey:

|   1024 b4:35:5d:00:90:1c:2c:6f:cc:e2:0e:c3:01:41:34:63 (DSA)

|_  2048 83:0e:8b:dd:53:b2:ca:75:5c:5d:75:75:c5:5d:f8:25 (RSA)

2710/tcp closed sso-service

4662/tcp closed edonkey

6881/tcp closed bittorrent-tracker

6901/tcp closed jetstream

6969/tcp closed acmsoda

8181/tcp open   http               nginx 1.8.0


| Potentially risky methods: TRACE


|_http-server-header: nginx/1.8.0

|_http-title: Site doesn't have a title (text/html; charset=UTF-8).

Device type: general purpose|WAP|storage-misc|load balancer|firewall
Who is Participating?
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

I am not sure what your asking.  Do you have a user account on the system?

What is it your showing us here?
Gerwin Jansen, EE MVETopic Advisor Commented:
If you're asking to gain access to a system that you don't have an account for then we cannot help you I'm afraid. Boot into single user mode is an option that is left as a last resort (and change root pwd).
andrey_chevronAuthor Commented:
I don't have a physical access to the machine - so SUM is not an option.
No I don't have user name.
if you don't recognize nmap log - forget it .
Ultimate Tool Kit for Technology Solution Provider

Broken down into practical pointers and step-by-step instructions, the IT Service Excellence Tool Kit delivers expert advice for technology solution providers. Get your free copy now.

Gerwin Jansen, EE MVETopic Advisor Commented:
>> if you don't recognize nmap log - forget it .
Nobody said we didn't understand nmap log, I'm just saying we cannot help you finding/exploiting weaknesses in nginx/1.8.0 or OpenSSH 5.3.
The nmap log is fairly self explanatory, just has to relevance for your question.

As stated above, it is against the site rules to help you exploit a system to gain access.  

Best advice, find someone with physical access and use single user mode to gain access.

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
Best advice might be to get the new password(s) from the previous admin. It's very unethical to inhibit access in that way and potentially illegal. See perhaps the most famous similar example. Even if not classed under similar laws,  a letter from a lawyer might be convincing.
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today

From novice to tech pro — start learning today.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.