You have to do a Port Scan on that IP and ping IP addresses close by to map their Network from the outside, like creating a map of Gates of a Castle Town.
Then, you need a vulnerability expert, being a ligitimiate Law Enforcement Organisation you can get help by Anti-Virus and Firewall Software Corporations, that is up to date on OS vulnerabilities and thereby on how to exploit them.
There is a good chance that their IT expert is not that much of an expert and a real expert up to date on vulnerabilities can break into their network without asking for the password, but by actual hacking.
#cyberpunkcoltoure #provos #fuckthdfuckingfuckersfuckingfucksfuckhard