|Penetration-testing software should only be used by people who are thoroughly familiar with networking and can understand documentation. It is designed for a very specific purpose - to test the security of networks and sytems - and is not intended for use as a general purpose operating system. It is only of use to those experienced enough to be able to interpret the results.|
If you want to use such esoteric software then first read the documentation and make sure that you understand it. If you can't do that then you won't understand the data that the software provides you with.
It's a bit like asking "How do I drive a Formula One racing car?". If you don't know the answer, aren't already completely familiar with driving less powerful cars, and can't follow provided instructions, then it is not something you should attempt.