read remote file without password

We have old Linux machine in remote office and I need to read one file in /user/leasing.txt . No passwords available- admin changed them before leaving :(

nmap output:

1080/tcp closed socks

2222/tcp open   ssh                OpenSSH 5.3 (protocol 2.0)

| ssh-hostkey:

|   1024 b4:35:5d:00:90:1c:2c:6f:cc:e2:0e:c3:01:41:34:63 (DSA)

|_  2048 83:0e:8b:dd:53:b2:ca:75:5c:5d:75:75:c5:5d:f8:25 (RSA)

2710/tcp closed sso-service

4662/tcp closed edonkey

6881/tcp closed bittorrent-tracker

6901/tcp closed jetstream

6969/tcp closed acmsoda

8181/tcp open   http               nginx 1.8.0


| Potentially risky methods: TRACE


|_http-server-header: nginx/1.8.0

|_http-title: Site doesn't have a title (text/html; charset=UTF-8).

Device type: general purpose|WAP|storage-misc|load balancer|firewall
Who is Participating?

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

I am not sure what your asking.  Do you have a user account on the system?

What is it your showing us here?
Gerwin Jansen, EE MVETopic Advisor Commented:
If you're asking to gain access to a system that you don't have an account for then we cannot help you I'm afraid. Boot into single user mode is an option that is left as a last resort (and change root pwd).
andrey_chevronAuthor Commented:
I don't have a physical access to the machine - so SUM is not an option.
No I don't have user name.
if you don't recognize nmap log - forget it .
Big Business Goals? Which KPIs Will Help You

The most successful MSPs rely on metrics – known as key performance indicators (KPIs) – for making informed decisions that help their businesses thrive, rather than just survive. This eBook provides an overview of the most important KPIs used by top MSPs.

Gerwin Jansen, EE MVETopic Advisor Commented:
>> if you don't recognize nmap log - forget it .
Nobody said we didn't understand nmap log, I'm just saying we cannot help you finding/exploiting weaknesses in nginx/1.8.0 or OpenSSH 5.3.
The nmap log is fairly self explanatory, just has to relevance for your question.

As stated above, it is against the site rules to help you exploit a system to gain access.  

Best advice, find someone with physical access and use single user mode to gain access.

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
Best advice might be to get the new password(s) from the previous admin. It's very unethical to inhibit access in that way and potentially illegal. See perhaps the most famous similar example. Even if not classed under similar laws,  a letter from a lawyer might be convincing.
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today

From novice to tech pro — start learning today.