
simple network map scan:
nmap -sS -sV -T5 192.168.0.134

Notes:
As usual Since the port 80 is open, we started with a simple look on the browser:

The application seems like a simple Store, we can follow the recon with some Fuzzing to discover if there is any hidden routes, for that we will use feroxbuster:
feroxbuster -u <http://192.168.0.134/>
-w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
--filter-status 404 --scan-dir-listings
