It is a good idea to start a port scan on the server. A very basic fast way is:
nmap -sS <ip/fqdn>To get a bit more information use flags for default scripts (-sC), enumerate versions (-sV), output all formats (-oA) at put it in a file called defualt under the directory nmap:
nmap -sC -sV -oA nmap/default <ip/fqdn>If we see things that might be exploitable, use searchsploit, i.e. for vsftpd:
searchsploit vsftpd