Vulnerability analysis
So now you have done your recon and found services and their versions. You have looked in every corner of the target. Enumerated subdomains, scanned them, browsed through the webpage looking everywhere.
So, now it is time to see if any of these services contains any vulnerabilities.