BASIC + LEVEL 7 HACKTHIS

Como nos indica, escaneamos el sitio para ver que puertos y servicios asociados tiene:

┌─([12:34]sierra21@sierra21)-(~)
└──┤▶
nmap -p 1-65535 -T4 -A -v -PE www.hackthis.co.uk

SF-Port6776-TCP:V=6.40%I=7%D=12/9%Time=584AEAD0%P=x86_64-pc-linux-gnu%r(NU
SF:LL,45,"Welcome\x20weary\x20traveller\.\x20I\x20believe\x20you\x20are\x2
SF:0looking\x20for\x20this:\x20mapthat\n")%r(GetRequest,45,"Welcome\x20wea
SF:ry\x20traveller\.\x20I\x20believe\x20you\x20are\x20looking\x20for\x20th
SF:is:\x20mapthat\n")%r(SSLSessionReq,45,"Welcome\x20weary\x20traveller\.\
SF:x20I\x20believe\x20you\x20are\x20looking\x20for\x20this:\x20mapthat\n")
SF:%r(SMBProgNeg,45,"Welcome\x20weary\x20traveller\.\x20I\x20believe\x20yo
SF:u\x20are\x20looking\x20for\x20this:\x20mapthat\n")%r(SIPOptions,45,"Wel
SF:come\x20weary\x20traveller\.\x20I\x20believe\x20you\x20are\x20looking\x
SF:20for\x20this:\x20mapthat\n")%r(NCP,45,"Welcome\x20weary\x20traveller\.
SF:\x20I\x20believe\x20you\x20are\x20looking\x20for\x20this:\x20mapthat\n"
SF:)%r(WMSRequest,45,"Welcome\x20weary\x20traveller\.\x20I\x20believe\x20y
SF:ou\x20are\x20looking\x20for\x20this:\x20mapthat\n");
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

En esa respuesta al puerto 6776 tenemos la respuesta ;)