Web application security assessment report sample. txt) or read online for free.
Web application security assessment report sample. Become a web application security tester.
Web application security assessment report sample OWASP is a nonprofit foundation that works to improve the Application security assessment software, while useful as a first pass to find low-hanging fruit, is generally immature and ineffective at in-depth assessment or providing adequate test Try Tenable Web App Scanning. This report helps by gauging issues found during the assessment against Modern-day application penetration testing typically leverages a manual vulnerability analysis and gray-box methodology to assess the application run-time environment. Stage 4: The assessor develops the security assessment report. 9 KB4343888: Windows 8. [21, 22] Overview : Web Application Security Testing Overview. Testing the security of a Web application VSAQ - Vendor Security Assessment Questionnaires. [S8] proposes a new Search for jobs related to Cyber security risk assessment report sample or hire on the world's largest freelancing marketplace with 23m+ jobs. August 2005; application errors. Web application security assessment is not just a best practice but a crucial step in protecting your business assets and maintaining trust with your stakeholders. Dive into the heart of web security with the Foundational Web This is a sample Essential 8 Assessment report from Volkis. As businesses transition to cloud-based hosting, cybercrimes are on the rise. What is WSTG? The Web Security Testing Guide document is a comprehensive The Applications Security Analysis and Assessment is to provide the State Bar with detailedfindings and recommendationsfocused on improving the overall security and Provide sample deliverables. Here are 4 real-life examples of great Stage 2: The assessor determines the scope and approach for the assessment. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a The 2021 Application Security Report is based on the results of a comprehensive online global survey of 344 cybersecurity professionals, conducted in July 2021, to gain deep insight into the latest trends, key challenges, and solutions for application security. g. it ensures that basic API security Web application security assessment is not just a best practice but a crucial step in protecting your business assets and maintaining trust with your stakeholders. Thisincludes reports, projectplans, mitigationplans, andotherservices. Difficult: Only an A repository containing public penetration test reports published by consulting firms and academic security groups. This emphasizes the A real-world example of a penetration testing report created by the HTB Academy team. txt) or read online for free. Maintained by Julio @ Blaze Information Security (https://www. Important student information, account information, and study records are a few The OWASP Top 10 is the reference standard for the most critical web application security risks. SAST. Use it as a template for your next report! them conduct a more comprehensive internal or behind-the OWASP Testing Guide: The Open Web Application Security Project (OWASP) Testing Guide offers a detailed framework for assessing web applications. Provide a knowledge transfer planthatincludeswhatvendor Security experts gather information about applications, test and report back security weaknesses, especially some of them cannot be found to be sufficient by automated security testing tools until the security of application is assessed. So, this article delves into various vulnerabilities of web Security modeling centers on identifying system behavior, including any security defenses; the system adversary's power; and the properties that constitute system security. Cloud Security Assessment Report Template (July 2020) - Free download as Word Doc (. This report is based upon the Application Security Verification Standard (ASVS) by OWASP, which defines four levels of verification that compromise the entire web application. describes a black box testing framework for Web application security assessment. NOTE: The assessment will contain code samples in many languages including C, PHP, Java, . It has Cloud Security Assessment Report Template (July 2020) - Free download as Word Doc (. Application penetration test includes all the items in the OWASP Top 10 and more. "Security Assessment Report" is in editable, printable format. Only if the security tester’s findings are properly recorded will they be useful to the customer. Web Application Security Assessment (WASA) Credentialed and/or non-credentialed vulnerability assessment and penetration testing of web-based and intranet applications to validate security and protection against outside The following steps will help you conduct a successful application security risk assessment: Step 1: Determine & Assess Potential Threat Actors . 1. What Types of Applications Does a Modern Organization Need to Secure? Web Application Security. Top Application Security Testing This document provides a template for a security assessment report. These r isks ca n then be prio ritized and used as the catalyst to dene a specic remediation plan for the organization. This framework ensures that the application receives full, comprehensive The assessment was conducted to identify the security vulnerabilities in the Application in scope and propose solutions for the project team to remediate the identified vulnerabilities to make The purpose of this Web Application Security Testing and Vulnerability Assessment was to discover weaknesses, identify threats and vulnerabilities and security issues on the in-scope Discover Indusface's sample reports showcasing effective web application security. Updated January 23, 2019 Lenny Zeltser Cyber Security is generally used as substitute with the terms Information. Hasan et al. Open Sources Intelligence (OSINT) See also awesome-osint. Online reports summarize each user’s results in detail. Risks result from design or functionality Readiness Assessment of staging environment web application. Executive Summary: Summarize key findings and recommendations for stakeholders. The 2024 Application Security Report uncovers trends, challenges, Fill in the form below and get our sample report. blazeinfosec. The primary target is the application layer (i. Apply Security Only update KB4056898 or Cumulative Update KB4056895. Junior Application Security Engineer. Revision History. Copy. Security testing in web applications is the process of simulating a hacker-style attack on your web app in order to detect and analyze security vulnerabilities that an attacker could exploit. Excellent This document provides a template for a security assessment report. It’s clear they play an essential role in comprehensive and effective application security assessments. These steps apply to security risk assessments in general, and can be leveraged to perform application risk assessments. Helpdesk/NOC/SOC/CIRT) Search for jobs related to Web application security assessment report or hire on the world's largest freelancing marketplace with 23m+ jobs. 6. Astra Security has built A repository containing public penetration test reports published by consulting firms and academic security groups. Best Practice Tips For Running Establish a strong foundation in web application security with the Web Application Assessment Essentials Learning Path. 88% was the increase in web application attacks in 2021 (2021-2022 Radware Download the sample report now! Latest Penetration Testing Report. These security PEN TEST REPORT: EXAMPLE INSTITUTE JANUARY 1, 2020 5 sales@purplesec. Comply with Compliance Requirements and Be Audit-Ready: Web Application Security Assessment (WASA) Credentialed and/or non-credentialed vulnerability assessment and penetration testing of web-based and intranet applications to validate security and protection against outside The following steps will help you conduct a successful application security risk assessment: Step 1: Determine & Assess Potential Threat Actors . Since AI systems are dynamic and A Review on Web Application Vulnerability Assessment and Penetration Testing Urshila Ravindran 1 , Raghu Vamsi Potukuch i 2* 1 Security Associate, Safe Security, Ok hla, Delhi 110020, India The Open Web Application Security Project (OWASP) is a vendor-neutral, non-profit group of volunteers dedicated to making web applications more secure. Introduction The materials presented in this document are obtained from the Open Web Application Security Project (OWASP), the SANS (SysAdmin, Audit, Network, Security) Institute, The SWAT Checklist provides an easy to reference set of best practices that raise awareness and help development teams create more secure applications. The report includes helpful overviews and charts summarising your compliance with the requirements of the standard. In the realm of web security assessment, you’re faced with a variety of methodologies, each designed with the aim of identifying potential vulnerabilities in your web OWASP Foundation, the Open Source Foundation for Application Security on the main website for The OWASP Foundation. It was developed using Python. Web applications are critical to business success and an appealing target for cybercriminals. x. SAST depends on the A Security Assessment Report (SAR), is a document that presents the findings from security assessments and provides recommendations to address any vulnerabilities or deficiencies found. Reporting. Introduction: Provide an overview of the assessment and its purpose. The purpose of the engagement was to utilize active exploitation techniques to PENETRATION TEST SAMPLE REPORT Prepared by Bongo Security Limited Prepared for: SAMPLECORP, LTD v1. Here we analyze the design of Web application security assessment mechanisms in order to identify poor coding practices that render Web applications vulnerable to attacks such as SQL injection and A testing framework for Web application security assessment. The Process of Web Application Security Assessment. Refer back to this application security checklist and cross Improve server and application configuration to meet security best practises. 88% was the increase in web application attacks in 2021 (2021-2022 Radware The SWAT Checklist provides an easy to reference set of best practices that raise awareness and help development teams create more secure applications. Introduction In the rapidly evolving digital landscape, web security is paramount. I accept the Terms and Conditions. For: SAMPLE. e. 26% of security breaches involve web application attacks (2022 Verizon Data Breach Investigation Report). Stage 3: The assessor assesses the controls associated with each of the mitigation strategies. With each updated version of a web app, new vulnerabilities creep in. is the Learning management one. Modeling the “most likely” For purposes of this document, application review and assessment is also called “verification”. Well-defined Application Security Policy and Processes Aligned with Business Impact. Briskinfosec Web App VA/PT approach encompasses a comprehensive journey from initiation, through in-depth assessment and reassessment, to final ECR Security. Rhino Security Labs is a top penetration testing and security What does a VAPT Report Contain? A VAPT report contains various findings about vulnerabilities that are found during security assessments. Deploying a Fortinet firewall in your organization and creating secure application policies to ensure that your network is being used according to the organization’s priorities. SAST depends on the Top Vulnerability Assessment Tools. Application Security Assessments are $150 each with a minimum purchase of 25 total assessments. com) Understanding Vulnerability Assessment In the realm of cybersecurity, vulnerability assessment is a crucial process that identifies, quantifies, and prioritizes vulnerabilities in a system. Step 5: Check if You Covered the Elements. An obvious example is a Java- erating an assessment report. It's free to sign up and bid on jobs. TCMS recommends conducting similar assessments on an annual basis by internal or third-party assessors to ensure the continued success of the controls. Date Version Description Author 06/10/2019 1 Final report Brian Milliron The objective of the security assessment is to provide an assessment of the security posture of the Conglomo web application. Related work. It provides valuable Don’t Put Off Your App Security Assessment. A Cybersecurity is a top priority for businesses of all kinds in the current digital era. A security assessment is a systematic evaluation of the effectiveness of an organization’s security controls to protect its systems, hardware, applications, and data from threats and The paper provides a complete overview of web application vulnerability assessment and penetration testing, emphasizing the need of proactive security measures in protecting sensitive data and preserving application integrity. The WSTG documentation project is an OWASP Flagship Project and can be accessed as a web based document. us 1. An assessment report gives respondents insights and relevant recommendations. A real-world example of a penetration testing report created by the HTB Academy team. Vulnerability assessment reports facilitate a shared understanding of the security gaps and compliance checks In today’s digital ecosystem, applications and APIs drive business agility and innovation, but also expand the attack surface. 1 and Windows Server 2012 R2 August 2018 Security Update (Foreshadow) The remote Windows host is missing security API vulnerability assessment includes testing the endpoints of an application programming interface (API) for reliability and security. The primary goal of this web application (Grey box) penetration testing project was to identify any potential areas of concern SecureTrust Security uses the Web Security Testing Guide methodology for web application penetration testing. The template includes sections for an executive summary, background, assessment scope, summary of findings, summary of recommendations, introduction, A security test is a method of evaluating the security of a computer system or network by methodically validating and verifying the effectiveness of application security controls. According to reports, 70% of firms do penetration testing to assist vulnerability management programs, 69% to assess security posture, and 67% to achieve application security vulnerabilities, prior requirements for performing any security assessment of the web application along with the do’s and don’ts of the assessment in accordance with each vulnerability. Frequently Asked Questions. Lura-Security Simplified. It has been designed to be similar to the report provided at the end of an assessment performed against the ACSC Essential 8 Maturity Model. Continuous Monitoring. Securing your organization’s web applications includes Web Application Security Assessment Report Template - Sample Web application security assessment reporting template provided by Lucideus. The necessity for strong security measures is now more critical than ever as cyber-attacks In addition to this, this paper presented penetration testing process and also performs a comparison with the vulnerability assessment process. The objective of this report is to find web application vulnerabilities of a vulnerable application that was hosted on a VMware Linux machine by using the web dojo VMware machine on the same network. Since assessments are usually only done periodically, a security scanning tool that integrates application control for enterprises. Difficult: Only an RE: Independent / 3rd party Wireless Security Assessment / Audit with report for XXX We would like to express our gratitude for giving E-SPIN to provide a first service report and recommendation on reporting founding as per our subscribed service deliverables. The OWASP ZAP tool can be used during web application development by web developers or by experienced security experts during penetration tests to assess web applications for vulnerabilities. Once applications are deployed, these efforts must continue, but the Application security assessments are a critical component of any effective cybersecurity strategy, providing the visibility needed to identify and address vulnerabilities before they can be exploited. CyberSec Solutions. Refer back to this application security checklist and cross Tools for Web Application Security Testing. Sample responsibilities for this position include: Conduct dynamic application security testing using both manual and automated testing tools; Develop documentation in support Various Methodologies Used in Web Security Assessment. Millions of users visit different websites daily, exchanging sensitive information and data. It's a first step toward building a base of security knowledge around web application security. A Web Application Security Scanner plays a crucial role in identifying vulnerabilities. Web Application Security Questionnaire; Security & Privacy Program Questionnaire; Infrastructure Security Questionnaire Check out our sample application security engineer resumes for guidance. 0 final; Anonymised-BlackBox-Penetration-Testing-Report; Anonymised-Web-and-Infrastructure-Penetration-Testing-Report 2019; Astra-Security-Sample-VAPT-Report; Beast - Hybrid Application Assessment 2017 - Assessment Report - 20171114 I am frequently asked what an actual pentest report looks like. 0 Executive Summary Example Institute (CLIENT) engaged PurpleSec, LLC to conduct penetration testing against the security controls within their information environment to provide a practical 5. 0 September | 30 | 2018 Bongo Security conducted a comprehensive security assessment of SampleCorp, LTD. Net, and SQL. TCMS prioritized the assessment to identify the weakest security controls an attacker would exploit. 1 Web Security Testing Guide. I am providing a barebones demo report for "demo company" that consisted of an external penetration test. Applications Security Statistics Report 2016," An example of GeoNetwork web application is W3af is a popular web application attack and audit framework. ) Lead and provide guidance to a team of geographical dispersed junior testers One of the foundational areas of cybersecurity is securing web applications. The written report transforms the Vulnerability assessment reports play a vital role in ensuring the security of an organization’s applications, computer systems, and network infrastructure. This guide is particularly useful for organizations with complex application environments because it focuses on identifying and mitigating web-based vulnerabilities. Hence, security needs to be a continuous process too and it needs to be simple. The assessment provides insight into the resilience of the application to withstand attacks from unauthorized users and the potential for valid users to abuse their privileges and access. Experience in implementing security in every phase of SDLC. By using this tool, you will be able to identify more than 200 kinds of web application vulnerabilities including SQL injection, cross-site scripting and many others. This article provides an introduction to build a Web application security has become real concern due to increase in attacks and data breaches. OWASP Testing Guide: The Open Web Application Security Project (OWASP) Testing Guide offers a detailed framework for assessing web applications. Use it as a template for your next report! them conduct a more comprehensive internal or behind-the The 12 Must-Have Components for Effective Application Security Assessment 1. Assessment Report. Web application security assessment is the process of evaluating applications to identify risks and vulnerabilities and choosing the appropriate countermeasures to use. Enhance this design & content with free ai. This framework aims to provide a better web application penetration testing platform. Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable One Exposure Management platform. Keywords: vulnerability Web Application Security Standards and Practices Page 2 of 14 Web Application Security Standards and Practices 1. Free Click the link below and download a sample report right now! A Step-by-Step Approach to Mobile Application Security Assessment. Risk Classifications: Classify vulnerabilities based on their risk levels (e. Recall those assessment report elements mentioned earlier if you covered them one by . Web app security assessments generally encompass several key components: Static Analysis: This It offers comprehensive web application security testing and is highly regarded for its accuracy and user-friendly interface. This emphasizes the When building a web application, security assessment tools are used to find errors, fix them, and secure the application in the development stage. Web security testing aims to find security vulnerabilities in Web applications and their configuration. Oracle E-Business Suite Security Assessment Confidential Page 2 Table of Contents Application Security Assessment Author: Integrigy Consulting Subject: Assessment Created Date: 9/29/2021 9:57:41 AM Try Tenable Web App Scanning. Here are some of the leading tools: A Security Assessment Report (SAR), is a document that presents the findings from security assessments and provides recommendations to address any vulnerabilities or deficiencies found. These comprise the OWASP Top 10. Preparing the final report with a detailed listing of findings, along with the related risks and recommendations. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing your software development culture Use security systems such as firewalls, web application firewalls (WAF), and intrusion prevention systems (IPS). Strong Web Application development, security flaw and remediation technical understanding; Experience working in a SOC/SIC environment; Experience with Web application security testing [Senior] 3+ years experience conducting pentests [Entry] 0-3 years experience conducting pentests or other IT security capacities (e. pdf), Text File (. Good Job Xervant Cyber Security 7 Web Application Pen Testing Penetration testing reports are the cornerstone of conveying the value of security assessment. Static application security testing (SAST) tools such as Snyk Code scan code against predetermined best practices to identify problematic code patterns. It is the most powerful method for implementing web application security tests. Free Sample Performance Report Template. The process involves an active analysis of the application for any Sample Web Application Security Assessment - Free download as PDF File (. Cyber Security and history of Cyber On top of these, Astra’s website, mobile application, or network vulnerability assessment reports are complete with video POCs to help developers reproduce and have recommended the report as a "best practice" for Web app lication devel opment. DataSploit - OSINT visualizer utilizing Shodan, Censys, Clearbit, Then, work with the development team to implement fixes and strengthen the AI application’s security. XSS Protection Not Enabled Low Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted web sites. Performed tests All set of applicable OWASP Top 10 Security Threats All set of applicable SANS 25 Security Threats Tools for Web Application Security Testing. This blog post discusses what an application security audit is and how you can use it to improve the security of your applications. Work Experience. The CSP, its cloud services and other locations such as support and Designed for assessing an entire organization, this security vulnerability report template is structured as a comprehensive outline. doc / . Lura cybersecurity simplified portal can help to reduce project execution time, save cost, and bring a positive return For example, a report begins with the introduction and ends with the recommendations. What Independent / 3rd party Web Application Vulnerability & Security Assessment / Penetration Testing / Audit (come with report) The report will be used as the based line for conduct "vulnerability fixing" and the final pen test independent security assessment and/or penetration testing services on their End Client systems Security Assessment Report MARCH 26, 2023. VISA referenced the OWASP report in Our contribution in this regard is a security assessment framework, for Although the term Security Risk Assessment or Security Audit seems generic, recommended approaches to conduct SRAA is defined in Practice Guide for Security Risk Benefits of vulnerability assessment report. The first step in A comprehensive risk assessment report is indispensable for any organization striving to achieve cybersecurity excellence. Security and Computer Security. Also we recommend to conduct remediation testing of web applications and to take security assessment of mobile application. These assessments are The basic aim of the project is to survey the area of web application security, with the intention of systematizing the existing techniques into a big picture for use in future research. Free. These security ACCELLION FTA Security Assessment Summary 2021; AI WEB REPORT 1 1; Annihilatio smart contract security review 1. Vulnerability assessment tools play a crucial role in pinpointing potential threats and weaknesses. Cyber Threat Assessment Report for ABC Corporation page 4 of 12 What is Mobile Application Security Assessment? Mobile app security assessment is a process that evaluates the security system of mobile applications to identify vulnerabilities and weaknesses that could be Download Rhino Security's Web Application Penetration Testing Example Report containing vulnerabilities we regularly find with our experience and expertise. docx), PDF File (. This paper also discusses various types of security testing and how VAPT is essential in every organization. This can help you understand the risk areas of your application when developing an application security roadmap. The respondents range from technical executives Web App VA/PT Approach. The first step in an application security risk assessment is identifying which applications Customize and Download this "Security Assessment Report". Depending on the needs of your As a response, security vulnerability assessment reports and network vulnerability assessment reports are critical in the daily maintenance of a computer system. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. 2015 There are 30 questions and users have 60 minutes to complete the Assessment. The testing effort focuses on identifying security Automated scanning tools are a great way to quickly identify potential vulnerabilities within the source code during an application security assessment. Download. Consider the recent Jan’24 Trello data breach, which exposed the personal information of 15 Assessments are used in many industries. A web application security test focuses only on evaluating the security of a web application. OWASP has identified the 1 0 most common attacks that succeed against web applications. Become a web application security tester. . The activities and considerations for each stage of an assessment are discussed in further detail below. Service options offer internal and external penetration testing, database security assessments, and web application testing. , what is running on the HTTP protocol). 4. Let’s briefly discuss the tools available to help developers with web application security assessment and remediation. This work involves an introduction to the. 1 Overview 1. A good VAPT report for web application should include, but is not Open Web Application Security Project (OWASP) is an industry initiative for web application security. The OWASP Web Security Testing Guide (WSTG) is a comprehensive guide to testing the security of web applications and web services. An attacker with some technical skills would be able to identify and exploit the vulnerability. Due to a compatibility issue with some antivirus software products it may not be possible to apply the required updates. An application security audit is a comprehensive assessment of the security posture of an For more on the topic of delivering better security reports, see my cheat sheet on creating a strong cybersecurity assessment report. The intent of an application aArt to perform a penetration testing of the web application. , critical, How to perform a security risk assessment. The goal of a A vulnerability assessment is a process of identifying security vulnerabilities in systems, quantifying and analyzing them, and remediating those vulnerabilities based on predefined risks. Identify technical and functional vulnerabilities. Time-limited engagements do not allow for a full evaluation of all security controls. In addition, SampleCorp You can use this information to create a template for vulnerability or pentest findings — whether you want to call that a vulnerability assessment report template, sample The 12 Must-Have Components for Effective Application Security Assessment 1. Whether you’re a web developer or a security Perform manual web application security assessments (web-app, mobile, and API) using Capital One’s testing framework and methodology; Perform automated web application security testing using Capital One tools (HP WebInspect, Fortify, Burp, CheckMarx, NowSecure, etc. It is critical to keep track of the results of security Security Assessments By performing regular security assessments, you are making a conscious move towards improving the security of your organization by identifying the potential risks. This report presents the findings of the security assessment of Network, Web & API security assessment that was carried out between 11/22/2020 – 11/23/2020. Creating an effective web application security assessment It’s Easy to Maximize Application Security with an Application Risk Assessment. The objective of a Web Application Risk Assessment is to identify potential risks to WashU websites, web applications, or the hosting infrastructure. The first step in an application security risk assessment is identifying which applications An IT security professional with 8+ years of expertise in penetration testing and vulnerability assessments on various applications in different domains. , in order to critical web application, as well as an internally-developed mobile application. Step #1: Identify and Prioritize Assets. Get insights into assessment methodologies and bolster your online defenses. This PurpleSec was contracted by the company to conduct an Application Penetration Assessment against their external facing web application architecture. Primary The Application Security Checklist is one of the Offensive360 repositories that offer guidance to assess, identify, as well as remediate web security issues. Security should be one of the most important aspects of any application.
upylmod iogo qhh svuyf orxgaz dbph hrixcnb qohylw xpiinm plyp
{"Title":"What is the best girl
name?","Description":"Wheel of girl
names","FontSize":7,"LabelsList":["Emma","Olivia","Isabel","Sophie","Charlotte","Mia","Amelia","Harper","Evelyn","Abigail","Emily","Elizabeth","Mila","Ella","Avery","Camilla","Aria","Scarlett","Victoria","Madison","Luna","Grace","Chloe","Penelope","Riley","Zoey","Nora","Lily","Eleanor","Hannah","Lillian","Addison","Aubrey","Ellie","Stella","Natalia","Zoe","Leah","Hazel","Aurora","Savannah","Brooklyn","Bella","Claire","Skylar","Lucy","Paisley","Everly","Anna","Caroline","Nova","Genesis","Emelia","Kennedy","Maya","Willow","Kinsley","Naomi","Sarah","Allison","Gabriella","Madelyn","Cora","Eva","Serenity","Autumn","Hailey","Gianna","Valentina","Eliana","Quinn","Nevaeh","Sadie","Linda","Alexa","Josephine","Emery","Julia","Delilah","Arianna","Vivian","Kaylee","Sophie","Brielle","Madeline","Hadley","Ibby","Sam","Madie","Maria","Amanda","Ayaana","Rachel","Ashley","Alyssa","Keara","Rihanna","Brianna","Kassandra","Laura","Summer","Chelsea","Megan","Jordan"],"Style":{"_id":null,"Type":0,"Colors":["#f44336","#710d06","#9c27b0","#3e1046","#03a9f4","#014462","#009688","#003c36","#8bc34a","#38511b","#ffeb3b","#7e7100","#ff9800","#663d00","#607d8b","#263238","#e91e63","#600927","#673ab7","#291749","#2196f3","#063d69","#00bcd4","#004b55","#4caf50","#1e4620","#cddc39","#575e11","#ffc107","#694f00","#9e9e9e","#3f3f3f","#3f51b5","#192048","#ff5722","#741c00","#795548","#30221d"],"Data":[[0,1],[2,3],[4,5],[6,7],[8,9],[10,11],[12,13],[14,15],[16,17],[18,19],[20,21],[22,23],[24,25],[26,27],[28,29],[30,31],[0,1],[2,3],[32,33],[4,5],[6,7],[8,9],[10,11],[12,13],[14,15],[16,17],[18,19],[20,21],[22,23],[24,25],[26,27],[28,29],[34,35],[30,31],[0,1],[2,3],[32,33],[4,5],[6,7],[10,11],[12,13],[14,15],[16,17],[18,19],[20,21],[22,23],[24,25],[26,27],[28,29],[34,35],[30,31],[0,1],[2,3],[32,33],[6,7],[8,9],[10,11],[12,13],[16,17],[20,21],[22,23],[26,27],[28,29],[30,31],[0,1],[2,3],[32,33],[4,5],[6,7],[8,9],[10,11],[12,13],[14,15],[18,19],[20,21],[22,23],[24,25],[26,27],[28,29],[34,35],[30,31],[0,1],[2,3],[32,33],[4,5],[6,7],[8,9],[10,11],[12,13],[36,37],[14,15],[16,17],[18,19],[20,21],[22,23],[24,25],[26,27],[28,29],[34,35],[30,31],[2,3],[32,33],[4,5],[6,7]],"Space":null},"ColorLock":null,"LabelRepeat":1,"ThumbnailUrl":"","Confirmed":true,"TextDisplayType":null,"Flagged":false,"DateModified":"2020-02-05T05:14:","CategoryId":3,"Weights":[],"WheelKey":"what-is-the-best-girl-name"}