Some HINTS:
user1: forget hashes. forget cracking. forget {crypt}. The life is plenty of rabbit holes. listen inside the box what ldap wants to say. using tcpd*** is your friend. Be patient, the noise doesn’t appear fast. while it listens, go to take a drink with your friends. Saving the result in a pcap file makes easier to read. Bindrequest is the start of the authentication. Get focused on those packets…
NOTE: ssh credentials are not the same as unix credentials…
user2: ba****.*z is your friend. encrypted? password needed? use scripting such as 7zip-JTR Decrypt Script · GitHub and enjoy. After that read the content carefully.
root: two binaries are present. o*****l is ur friend. The other one… just another rabbit hole. Pay attention to capabilities and check if this binary has any relation with them. Do what you really want to do taking advantage of this binary. Is it possible to elevate privilege using that binary? Maybeeee…