Vulnerable Machine
To know the target IP address
Nmap
What Ports to Start With
Enumerating HTTP/HTTPS
Enumerating SMB
Enumerating SSH
Researching Potential Vulnerabilities