The goal was trying to access the machine so multiple tests where done such as:
Service scanning to know the open ports and its services,
SQL injection test,
Command injection,
The machine was accessed by a reverse shell.
The provided report explains all the steps taken to achieve the goal.