Notes From Addressing Penetration Test Findings

I have recently read a number of PenTest reports and investigated and fixed the vulnerabilities.

In the Pentest reports I have read it has been common for the first section to be about identifying the technology the application is written in, this is used to make some initial suggestions on shortcomings in the application.