From nmap, there are some service opened.

Local Picture

With further scanning, I found that port 5985 and 49668 are opened as well.

Local Picture

This is the web page.

Local Picture

Press Login as guest, we are redirected to issues.php. hazard could be a username.

Local Picture

I got config.txt from the Attachment. There are some credentials encrypted. One is md5, I use hashcat to decrypt it.

Local Picture

Since they mentioned cisco router in issues.php, I used ciscot7.py to decrypt cisco type 7 password.

Local Picture

Now I got 3 usernames and 3 passwords, I used crackmapexec to see which pair can login to smb.

Local Picture

I can login to rpc with this credential as well, so I use lookupsid.py to get more usernames.

Local Picture

I used winrm_login module in msf, trying to find the credential pair for winrm.

Local Picture

I got connected as chase with evil-winrm.

Local Picture

I access C:\inetpub\wwwroot\login.php to find the credential for the web portal.

Local Picture

Local Picture

I cracked the password from a cracking website, and get login as administrator with this password using evil-winrm.

Local Picture