SpaceafterFilename,DylibHijacking,Third-partySoftware,StandardNon-ApplicationLayerProtocol,ExecutionthroughAPI,HISTCONTROL,ExploitPublic-FacingApplication,ComponentFirmware,SharedWebroot,Hooking,NewService,DisablingSecurityTools,File andDirectoryDiscovery,CreateAccount,AccessTokenManipulation,DataCompressed,RedundantAccess,DLLSearchOrderHijacking,SystemInformationDiscovery,ChangeDefault FileAssociation,ComponentObjectModelHijacking,IndicatorBlocking,Exploitationfor ClientExecution,CodeSigning,RemoteAccessTools,PlistModification,Regsvcs/Regasm,TimeProviders,StandardCryptographicProtocol,SecuritySupportProvider,Bootkit,DataObfuscation,SystemOwner/UserDiscovery,InputPrompt,CMSTP,VideoCapture,FileDeletion,RemoteDesktopProtocol,Drive-byCompromise,SoftwarePacking,PermissionGroupsDiscovery,Masquerading,Rc.common,LaunchDaemon,ScheduledTransfer,PrivateKeys,UserExecution,ObfuscatedFiles orInformation,SudoCaching,LSASSDriver,NTFS FileAttributes,PasstheHash,HardwareAdditions,Regsvr32,PasstheTicket,ExploitationforCredentialAccess,AccessibilityFeatures,SecuritySoftwareDiscovery,ClipboardData,ExtraWindowMemoryInjection,Re-openedApplications,Rundll32,PeripheralDeviceDiscovery,SIP andTrustProviderHijacking,MultibandCommunication,AutomatedCollection,HiddenFiles andDirectories,SecuritydMemory,ExfiltrationOverAlternativeProtocol,LaunchAgent,Data fromLocalSystem,AppleScript,AccountDiscovery,StandardApplicationLayerProtocol,PasswordFilterDLL,ExploitationforPrivilegeEscalation,Two-FactorAuthenticationInterception,WindowsAdminShares,SetuidandSetgid,BruteForce,Exploitationof RemoteServices,WindowsRemoteManagement,DLLSide-Loading,ExecutionthroughModuleLoad,SystemFirmware,SignedBinaryProxyExecution,DataEncoding,HiddenWindow,BrowserBookmarkDiscovery,KernelModulesandExtensions,Timestomp,ReplicationThroughRemovableMedia,Keychain,LLMNR/NBT-NSPoisoning,.bash_profileand .bashrc,StartupItems,CommonlyUsed Port,ClearCommandHistory,Screensaver,Deobfuscate/DecodeFiles or Information,SystemTimeDiscovery,Supply ChainCompromise,File SystemPermissionsWeakness,WindowsManagementInstrumentationEventSubscription,Credentialsin Registry,ProcessDoppelgänging,Image FileExecutionOptionsInjection,LC_LOAD_DYLIBAddition,DomainFronting,ValidAccounts,Scripting,Local JobScheduling,RemoteFileCopy,ScreenCapture,DataTransferSizeLimits,SpearphishingAttachment,NetworkShareDiscovery,SSHHijacking,Data fromNetworkSharedDrive,PasswordPolicyDiscovery,CredentialDumping,ExfiltrationOverPhysicalMedium,IndicatorRemovalon Host,InstallRootCertificate,ModifyRegistry,CustomCryptographicProtocol,TrustedRelationship,Hypervisor,Data fromInformationRepositories,Multi-StageChannels,ExfiltrationOver OtherNetworkMedium,WebShell,LoginItem,NetworkShareConnectionRemoval,PathInterception,Rootkit,ApplicationShimming,WinlogonHelperDLL,ExfiltrationOverCommandand ControlChannel,EmailCollection,GatekeeperBypass,SystemServiceDiscovery,IndirectCommandExecution,Command-LineInterface,TaintSharedContent,AutomatedExfiltration,AppCertDLLs,AudioCapture,BashHistory,ScheduledTask,NetworkSniffing,NetshHelperDLL,DynamicDataExchange,BypassUserAccountControl,Spearphishingvia Service,AccountManipulation,LogonScripts,BrowserExtensions,IndicatorRemovalfromTools,ExternalRemoteServices,ServiceRegistryPermissionsWeakness,PortMonitors,SID-HistoryInjection,Man intheBrowser,FileSystemLogicalOffsets,ApplicationDeploymentSoftware,ProcessInjection,WindowsManagementInstrumentation,Multi-hopProxy,RegistryRun Keys/ StartFolder,WebService,LC_MAINHijacking,CustomCommandand ControlProtocol,Mshta,BinaryPadding,DataEncrypted,RemoteSystemDiscovery,PortKnocking,GraphicalUserInterface,BITSJobs,DCShadow,ServiceExecution,InputCapture,RemoteServices,Launchctl,MultilayerEncryption,Trap,ApplicationWindowDiscovery,SystemNetworkConnectionsDiscovery,Sudo,DataStaged,SystemNetworkConfigurationDiscovery,AppInitDLLs,ControlPanelItems,DistributedComponentObjectModel,Data fromRemovableMedia,FallbackChannels,InstallUtil,AuthenticationPackage,QueryRegistry,ProcessDiscovery,TrustedDeveloperUtilities,ForcedAuthentication,ShortcutModification,SignedScriptProxyExecution,Exploitationfor DefenseEvasion,PowerShell,ConnectionProxy,Kerberoasting,NetworkServiceScanning,ProcessHollowing,SpearphishingLink,HiddenUsers,CommunicationThroughRemovableMedia,OfficeApplicationStartup,Source,Credentialsin Files,UncommonlyUsed Port,ModifyExistingService,SpaceafterFilename,DylibHijacking,Third-partySoftware,StandardNon-ApplicationLayerProtocol,ExecutionthroughAPI,HISTCONTROL,ExploitPublic-FacingApplication,ComponentFirmware,SharedWebroot,Hooking,NewService,DisablingSecurityTools,File andDirectoryDiscovery,CreateAccount,AccessTokenManipulation,DataCompressed,RedundantAccess,DLLSearchOrderHijacking,SystemInformationDiscovery,ChangeDefault FileAssociation,ComponentObjectModelHijacking,IndicatorBlocking,Exploitationfor ClientExecution,CodeSigning,RemoteAccessTools,PlistModification,Regsvcs/Regasm,TimeProviders,StandardCryptographicProtocol,SecuritySupportProvider,Bootkit,DataObfuscation,SystemOwner/UserDiscovery,InputPrompt,CMSTP,VideoCapture,FileDeletion,RemoteDesktopProtocol,Drive-byCompromise,SoftwarePacking,PermissionGroupsDiscovery,Masquerading,Rc.common,LaunchDaemon,ScheduledTransfer,PrivateKeys,UserExecution,ObfuscatedFiles orInformation,SudoCaching,LSASSDriver,NTFS FileAttributes,PasstheHash,HardwareAdditions,Regsvr32,PasstheTicket,ExploitationforCredentialAccess,AccessibilityFeatures,SecuritySoftwareDiscovery,ClipboardData,ExtraWindowMemoryInjection,Re-openedApplications,Rundll32,PeripheralDeviceDiscovery,SIP andTrustProviderHijacking,MultibandCommunication,AutomatedCollection,HiddenFiles andDirectories,SecuritydMemory,ExfiltrationOverAlternativeProtocol,LaunchAgent,Data fromLocalSystem,AppleScript,AccountDiscovery,StandardApplicationLayerProtocol,PasswordFilterDLL,ExploitationforPrivilegeEscalation,Two-FactorAuthenticationInterception,WindowsAdminShares,SetuidandSetgid,BruteForce,Exploitationof RemoteServices,WindowsRemoteManagement,DLLSide-Loading,ExecutionthroughModuleLoad,SystemFirmware,SignedBinaryProxyExecution,DataEncoding,HiddenWindow,BrowserBookmarkDiscovery,KernelModulesandExtensions,Timestomp,ReplicationThroughRemovableMedia,Keychain,LLMNR/NBT-NSPoisoning,.bash_profileand .bashrc,StartupItems,CommonlyUsed Port,ClearCommandHistory,Screensaver,Deobfuscate/DecodeFiles or Information,SystemTimeDiscovery,Supply ChainCompromise,File SystemPermissionsWeakness,WindowsManagementInstrumentationEventSubscription,Credentialsin Registry,ProcessDoppelgänging,Image FileExecutionOptionsInjection,LC_LOAD_DYLIBAddition,DomainFronting,ValidAccounts,Scripting,Local JobScheduling,RemoteFileCopy,ScreenCapture,DataTransferSizeLimits,SpearphishingAttachment,NetworkShareDiscovery,SSHHijacking,Data fromNetworkSharedDrive,PasswordPolicyDiscovery,CredentialDumping,ExfiltrationOverPhysicalMedium,IndicatorRemovalon Host,InstallRootCertificate,ModifyRegistry,CustomCryptographicProtocol,TrustedRelationship,Hypervisor,Data fromInformationRepositories,Multi-StageChannels,ExfiltrationOver OtherNetworkMedium,WebShell,LoginItem,NetworkShareConnectionRemoval,PathInterception,Rootkit,ApplicationShimming,WinlogonHelperDLL,ExfiltrationOverCommandand ControlChannel,EmailCollection,GatekeeperBypass,SystemServiceDiscovery,IndirectCommandExecution,Command-LineInterface,TaintSharedContent,AutomatedExfiltration,AppCertDLLs,AudioCapture,BashHistory,ScheduledTask,NetworkSniffing,NetshHelperDLL,DynamicDataExchange,BypassUserAccountControl,Spearphishingvia Service,AccountManipulation,LogonScripts,BrowserExtensions,IndicatorRemovalfromTools,ExternalRemoteServices,ServiceRegistryPermissionsWeakness,PortMonitors,SID-HistoryInjection,Man intheBrowser,FileSystemLogicalOffsets,ApplicationDeploymentSoftware,ProcessInjection,WindowsManagementInstrumentation,Multi-hopProxy,RegistryRun Keys/ StartFolder,WebService,LC_MAINHijacking,CustomCommandand ControlProtocol,Mshta,BinaryPadding,DataEncrypted,RemoteSystemDiscovery,PortKnocking,GraphicalUserInterface,BITSJobs,DCShadow,ServiceExecution,InputCapture,RemoteServices,Launchctl,MultilayerEncryption,Trap,ApplicationWindowDiscovery,SystemNetworkConnectionsDiscovery,Sudo,DataStaged,SystemNetworkConfigurationDiscovery,AppInitDLLs,ControlPanelItems,DistributedComponentObjectModel,Data fromRemovableMedia,FallbackChannels,InstallUtil,AuthenticationPackage,QueryRegistry,ProcessDiscovery,TrustedDeveloperUtilities,ForcedAuthentication,ShortcutModification,SignedScriptProxyExecution,Exploitationfor DefenseEvasion,PowerShell,ConnectionProxy,Kerberoasting,NetworkServiceScanning,ProcessHollowing,SpearphishingLink,HiddenUsers,CommunicationThroughRemovableMedia,OfficeApplicationStartup,Source,Credentialsin Files,UncommonlyUsed Port,ModifyExistingService,

Untitled Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
  1. Space after Filename,
  2. Dylib Hijacking,
  3. Third-party Software,
  4. Standard Non-Application Layer Protocol,
  5. Execution through API,
  6. HISTCONTROL,
  7. Exploit Public-Facing Application,
  8. Component Firmware,
  9. Shared Webroot,
  10. Hooking,
  11. New Service,
  12. Disabling Security Tools,
  13. File and Directory Discovery,
  14. Create Account,
  15. Access Token Manipulation,
  16. Data Compressed,
  17. Redundant Access,
  18. DLL Search Order Hijacking,
  19. System Information Discovery,
  20. Change Default File Association,
  21. Component Object Model Hijacking,
  22. Indicator Blocking,
  23. Exploitation for Client Execution,
  24. Code Signing,
  25. Remote Access Tools,
  26. Plist Modification,
  27. Regsvcs/Regasm,
  28. Time Providers,
  29. Standard Cryptographic Protocol,
  30. Security Support Provider,
  31. Bootkit,
  32. Data Obfuscation,
  33. System Owner/User Discovery,
  34. Input Prompt,
  35. CMSTP,
  36. Video Capture,
  37. File Deletion,
  38. Remote Desktop Protocol,
  39. Drive-by Compromise,
  40. Software Packing,
  41. Permission Groups Discovery,
  42. Masquerading,
  43. Rc.common,
  44. Launch Daemon,
  45. Scheduled Transfer,
  46. Private Keys,
  47. User Execution,
  48. Obfuscated Files or Information,
  49. Sudo Caching,
  50. LSASS Driver,
  51. NTFS File Attributes,
  52. Pass the Hash,
  53. Hardware Additions,
  54. Regsvr32,
  55. Pass the Ticket,
  56. Exploitation for Credential Access,
  57. Accessibility Features,
  58. Security Software Discovery,
  59. Clipboard Data,
  60. Extra Window Memory Injection,
  61. Re-opened Applications,
  62. Rundll32,
  63. Peripheral Device Discovery,
  64. SIP and Trust Provider Hijacking,
  65. Multiband Communication,
  66. Automated Collection,
  67. Hidden Files and Directories,
  68. Securityd Memory,
  69. Exfiltration Over Alternative Protocol,
  70. Launch Agent,
  71. Data from Local System,
  72. AppleScript,
  73. Account Discovery,
  74. Standard Application Layer Protocol,
  75. Password Filter DLL,
  76. Exploitation for Privilege Escalation,
  77. Two-Factor Authentication Interception,
  78. Windows Admin Shares,
  79. Setuid and Setgid,
  80. Brute Force,
  81. Exploitation of Remote Services,
  82. Windows Remote Management,
  83. DLL Side-Loading,
  84. Execution through Module Load,
  85. System Firmware,
  86. Signed Binary Proxy Execution,
  87. Data Encoding,
  88. Hidden Window,
  89. Browser Bookmark Discovery,
  90. Kernel Modules and Extensions,
  91. Timestomp,
  92. Replication Through Removable Media,
  93. Keychain,
  94. LLMNR/NBT-NS Poisoning,
  95. .bash_profile and .bashrc,
  96. Startup Items,
  97. Commonly Used Port,
  98. Clear Command History,
  99. Screensaver,
  100. Deobfuscate/Decode Files or Information,
  101. System Time Discovery,
  102. Supply Chain Compromise,
  103. File System Permissions Weakness,
  104. Windows Management Instrumentation Event Subscription,
  105. Credentials in Registry,
  106. Process Doppelgänging,
  107. Image File Execution Options Injection,
  108. LC_LOAD_DYLIB Addition,
  109. Domain Fronting,
  110. Valid Accounts,
  111. Scripting,
  112. Local Job Scheduling,
  113. Remote File Copy,
  114. Screen Capture,
  115. Data Transfer Size Limits,
  116. Spearphishing Attachment,
  117. Network Share Discovery,
  118. SSH Hijacking,
  119. Data from Network Shared Drive,
  120. Password Policy Discovery,
  121. Credential Dumping,
  122. Exfiltration Over Physical Medium,
  123. Indicator Removal on Host,
  124. Install Root Certificate,
  125. Modify Registry,
  126. Custom Cryptographic Protocol,
  127. Trusted Relationship,
  128. Hypervisor,
  129. Data from Information Repositories,
  130. Multi-Stage Channels,
  131. Exfiltration Over Other Network Medium,
  132. Web Shell,
  133. Login Item,
  134. Network Share Connection Removal,
  135. Path Interception,
  136. Rootkit,
  137. Application Shimming,
  138. Winlogon Helper DLL,
  139. Exfiltration Over Command and Control Channel,
  140. Email Collection,
  141. Gatekeeper Bypass,
  142. System Service Discovery,
  143. Indirect Command Execution,
  144. Command-Line Interface,
  145. Taint Shared Content,
  146. Automated Exfiltration,
  147. AppCert DLLs,
  148. Audio Capture,
  149. Bash History,
  150. Scheduled Task,
  151. Network Sniffing,
  152. Netsh Helper DLL,
  153. Dynamic Data Exchange,
  154. Bypass User Account Control,
  155. Spearphishing via Service,
  156. Account Manipulation,
  157. Logon Scripts,
  158. Browser Extensions,
  159. Indicator Removal from Tools,
  160. External Remote Services,
  161. Service Registry Permissions Weakness,
  162. Port Monitors,
  163. SID-History Injection,
  164. Man in the Browser,
  165. File System Logical Offsets,
  166. Application Deployment Software,
  167. Process Injection,
  168. Windows Management Instrumentation,
  169. Multi-hop Proxy,
  170. Registry Run Keys / Start Folder,
  171. Web Service,
  172. LC_MAIN Hijacking,
  173. Custom Command and Control Protocol,
  174. Mshta,
  175. Binary Padding,
  176. Data Encrypted,
  177. Remote System Discovery,
  178. Port Knocking,
  179. Graphical User Interface,
  180. BITS Jobs,
  181. DCShadow,
  182. Service Execution,
  183. Input Capture,
  184. Remote Services,
  185. Launchctl,
  186. Multilayer Encryption,
  187. Trap,
  188. Application Window Discovery,
  189. System Network Connections Discovery,
  190. Sudo,
  191. Data Staged,
  192. System Network Configuration Discovery,
  193. AppInit DLLs,
  194. Control Panel Items,
  195. Distributed Component Object Model,
  196. Data from Removable Media,
  197. Fallback Channels,
  198. InstallUtil,
  199. Authentication Package,
  200. Query Registry,
  201. Process Discovery,
  202. Trusted Developer Utilities,
  203. Forced Authentication,
  204. Shortcut Modification,
  205. Signed Script Proxy Execution,
  206. Exploitation for Defense Evasion,
  207. PowerShell,
  208. Connection Proxy,
  209. Kerberoasting,
  210. Network Service Scanning,
  211. Process Hollowing,
  212. Spearphishing Link,
  213. Hidden Users,
  214. Communication Through Removable Media,
  215. Office Application Startup,
  216. Source,
  217. Credentials in Files,
  218. Uncommonly Used Port,
  219. Modify Existing Service,