Heist

Rooted, it’s a nice box, good enumeration practice for Windows.

Lots of hints already in this discussion thread. For user, there’s one level of indirection to get another user using a well known method for enumerating users on a well known port. For root, look at what’s running, which user is running it, then look for data.

PM for hints.