Well, if this was an actual pentest, than your friend was either pretty brave, or extremely generous.
Anyway, just to get you going on your pentesting career, please look up the Penetration Testing Standard Execution (PTSE) as a basis for "proper" or "standardized" procedures. Individual preferences in actual practice may differ slightly, but the gist is there.
Secondly, I'd say stop doing anything further. You run the risk doing some damage to your friend's network or your own box if you don't know what you are doing. At the moment, you've done some pretty harmless scanning, and have not gone into actual exploitation (which does require more than a basic knowledge of what you are doing).
At this stage you can't write a report worth squat, so don't even bother. Just apologize to your friend for your lack of professionalism.
To get you own your way in the exciting world of pentesting, Google for the various certifications that you can acquire. They will get you going on the theoretical part of your education. Your university, or another higher education institution nearby, might even offer some of the more common ones. There are also online options, but I'm old school and prefer live courses, lol.
Secondly, since you managed to find your way to this forum, and have already started playing with some of the tools at hand, might I suggest you do this on virtual machines. You can download vulnerable boxes, set them up as vm's, set up BT as a vm, and familiarize yourself with the tools that way. After that, there are online playgrounds where you can further enhance your familiarity with these tools. Again, Google is your best friend here.
I got started in the most unusual fashion. Our company network was compromized, and our in-house techies had no idea what to do other than to clean reinstall backups (wow, incident handling was never in their dictionary, lol). Naturally, we got hit again. And, again, ad nauseum.
So, I went to the local book store to learn about hackers and chanced upon this nice little book; Dissecting the Hack, The Forbidden Network. In that little book, you will find all the references you need for your further research and education at this stage in your career.
I am no computer techie or geek, and I have no educational background in computing. Yet I was so proud just last week when I was at a half-day pentesting refresher and update workshop. The instructor actually pulled me aside and commended me for understanding concepts and tools better than the other guys (and gals) who were senior network admins for their corporations.
I have my paper certs, but I am no professional pentester (not my day job). The only real system I've ever used my knowledge and skills on are on my company systems. And, that also with the oversight of friends who are actual pentesters. I'm actually the head of marketing for our company, lol. Our chief information officer and his network guys should give me part of their salary for doing their work for them!
Anyway, good luck on your endeavours. May you enjoy many sleepless nights banging away at your keyboard and going blind looking at your monitor in the dark, lol.