Untitled Bingo

Untitled Bingo Card
Preview

This bingo card has a free space and 219 words: .bash_profile and .bashrc,, Access Token Manipulation,, Accessibility Features,, Account Discovery,, Account Manipulation,, AppCert DLLs,, AppInit DLLs,, AppleScript,, Application Deployment Software,, Application Shimming,, Application Window Discovery,, Audio Capture,, Authentication Package,, Automated Collection,, Automated Exfiltration,, Bash History,, Binary Padding,, BITS Jobs,, Bootkit,, Browser Bookmark Discovery,, Browser Extensions,, Brute Force,, Bypass User Account Control,, Change Default File Association,, Clear Command History,, Clipboard Data,, CMSTP,, Code Signing,, Command-Line Interface,, Commonly Used Port,, Communication Through Removable Media,, Component Firmware,, Component Object Model Hijacking,, Connection Proxy,, Control Panel Items,, Create Account,, Credential Dumping,, Credentials in Files,, Credentials in Registry,, Custom Command and Control Protocol,, Custom Cryptographic Protocol,, Data Compressed,, Data Encoding,, Data Encrypted,, Data from Information Repositories,, Data from Local System,, Data from Network Shared Drive,, Data from Removable Media,, Data Obfuscation,, Data Staged,, Data Transfer Size Limits,, DCShadow,, Deobfuscate/Decode Files or Information,, Disabling Security Tools,, Distributed Component Object Model,, DLL Search Order Hijacking,, DLL Side-Loading,, Domain Fronting,, Drive-by Compromise,, Dylib Hijacking,, Dynamic Data Exchange,, Email Collection,, Execution through API,, Execution through Module Load,, Exfiltration Over Alternative Protocol,, Exfiltration Over Command and Control Channel,, Exfiltration Over Other Network Medium,, Exfiltration Over Physical Medium,, Exploit Public-Facing Application,, Exploitation for Client Execution,, Exploitation for Credential Access,, Exploitation for Defense Evasion,, Exploitation for Privilege Escalation,, Exploitation of Remote Services,, External Remote Services,, Extra Window Memory Injection,, Fallback Channels,, File and Directory Discovery,, File Deletion,, File System Logical Offsets,, File System Permissions Weakness,, Forced Authentication,, Gatekeeper Bypass,, Graphical User Interface,, Hardware Additions,, Hidden Files and Directories,, Hidden Users,, Hidden Window,, HISTCONTROL,, Hooking,, Hypervisor,, Image File Execution Options Injection,, Indicator Blocking,, Indicator Removal from Tools,, Indicator Removal on Host,, Indirect Command Execution,, Input Capture,, Input Prompt,, Install Root Certificate,, InstallUtil,, Kerberoasting,, Kernel Modules and Extensions,, Keychain,, Launch Agent,, Launch Daemon,, Launchctl,, LC_LOAD_DYLIB Addition,, LC_MAIN Hijacking,, LLMNR/NBT-NS Poisoning,, Local Job Scheduling,, Login Item,, Logon Scripts,, LSASS Driver,, Man in the Browser,, Masquerading,, Modify Existing Service,, Modify Registry,, Mshta,, Multi-hop Proxy,, Multi-Stage Channels,, Multiband Communication,, Multilayer Encryption,, Netsh Helper DLL,, Network Service Scanning,, Network Share Connection Removal,, Network Share Discovery,, Network Sniffing,, New Service,, NTFS File Attributes,, Obfuscated Files or Information,, Office Application Startup,, Pass the Hash,, Pass the Ticket,, Password Filter DLL,, Password Policy Discovery,, Path Interception,, Peripheral Device Discovery,, Permission Groups Discovery,, Plist Modification,, Port Knocking,, Port Monitors,, PowerShell,, Private Keys,, Process Discovery,, Process Doppelgänging,, Process Hollowing,, Process Injection,, Query Registry,, Rc.common,, Re-opened Applications,, Redundant Access,, Registry Run Keys / Start Folder,, Regsvcs/Regasm,, Regsvr32,, Remote Access Tools,, Remote Desktop Protocol,, Remote File Copy,, Remote Services,, Remote System Discovery,, Replication Through Removable Media,, Rootkit,, Rundll32,, Scheduled Task,, Scheduled Transfer,, Screen Capture,, Screensaver,, Scripting,, Security Software Discovery,, Security Support Provider,, Securityd Memory,, Service Execution,, Service Registry Permissions Weakness,, Setuid and Setgid,, Shared Webroot,, Shortcut Modification,, SID-History Injection,, Signed Binary Proxy Execution,, Signed Script Proxy Execution,, SIP and Trust Provider Hijacking,, Software Packing,, Source,, Space after Filename,, Spearphishing Attachment,, Spearphishing Link,, Spearphishing via Service,, SSH Hijacking,, Standard Application Layer Protocol,, Standard Cryptographic Protocol,, Standard Non-Application Layer Protocol,, Startup Items,, Sudo,, Sudo Caching,, Supply Chain Compromise,, System Firmware,, System Information Discovery,, System Network Configuration Discovery,, System Network Connections Discovery,, System Owner/User Discovery,, System Service Discovery,, System Time Discovery,, Taint Shared Content,, Third-party Software,, Time Providers,, Timestomp,, Trap,, Trusted Developer Utilities,, Trusted Relationship,, Two-Factor Authentication Interception,, Uncommonly Used Port,, User Execution,, Valid Accounts,, Video Capture,, Web Service,, Web Shell,, Windows Admin Shares,, Windows Management Instrumentation,, Windows Management Instrumentation Event Subscription,, Windows Remote Management, and Winlogon Helper DLL,.

More like this:

ESCEI BINGO | Fraunhofer SCS IT Buzzword Bingo | System Software Bingo | BINGO | ESCEI Bingo

Play Online

Share this URL with your players:

For more control of your online game, create a clone of this card first.

Learn how to conduct a bingo game.

Call List

Probabilities

With players vying for a you'll have to call about __ items before someone wins. There's a __% chance that a lucky player would win after calling __ items.

Tip: If you want your game to last longer (on average), add more unique words/images to it.