I don't understand you, there happens to be on a list out there going around the internet saying who is and not vulnerable. In order for you to identify which websites lack security and take advantage of that gap you must start with the scanning phase:
Phase 1. Recognition (Recon/Reconnaissance) Prior to any attack.
Phase 2. Exploration (Exploring)
Phase 3. Gaining Access
Phase 4. Securing Access (Maintaining Access)
Phase 5. Covering Tracks (Covering Tracks)
you could start by learning this procedure!