Install Kali Linux and open any one of more than a dozen pen testing / exploit tools bundled with it. "Kali Linux comes with a lot of user documentation," says Saez.
You can try the Jawfish pen test tool using the available GUI form. Simply input an IP address for the server, a vulnerable web address at that IP address, then the vulnerability, method, and goal text. The tool returns the goal text when you have successfully hacked the address. This tool is entirely new and not vetted for enterprise adoption.
Compare, select, use, and patch
You will want to select tools based on where your most costly vulnerabilities lie. Once you find your vulnerabilities, it's important to patch them if there is a patch available, or secure around them if it is not.
Sign up for CIO Asia eNewsletters.