“If vulnerabilities are present, then this would be detected by the pen testing software employed” Short for “penetration testing”, pen testing is basically assessing a computer, wireless access point, underlying network, or individual application, to see how it would handle an online attack. If vulnerabilities are present, then this would be detected by the pen-testing software employed.
When starting out with pen testing, you’ll find that a lot of tools are available to use. Indeed, the breadth of choice is considerable, and while there is some duplication of function, it is important not to be intimidated by the selection available. Some tools are open, naturally, although some are proprietary; the choice of which to use will be yours.
Your choice will also be dictated by the package or operating system…