HISTCONTROL,QueryRegistry,Data fromNetworkSharedDrive,StandardCryptographicProtocol,BruteForce,ChangeDefault FileAssociation,SystemServiceDiscovery,StartupItems,CustomCommandand ControlProtocol,Keychain,ExploitationforPrivilegeEscalation,SystemNetworkConnectionsDiscovery,NTFS FileAttributes,ProcessHollowing,SID-HistoryInjection,SetuidandSetgid,ModifyExistingService,RemoteDesktopProtocol,ExfiltrationOverCommandand ControlChannel,GatekeeperBypass,SpearphishingAttachment,DataEncoding,Credentialsin Files,DLLSearchOrderHijacking,SecuritySupportProvider,SecuritySoftwareDiscovery,SIP andTrustProviderHijacking,InputPrompt,AudioCapture,AuthenticationPackage,Scripting,DataCompressed,BashHistory,IndicatorRemovalon Host,SpearphishingLink,CustomCryptographicProtocol,TrustedDeveloperUtilities,RemoteServices,SSHHijacking,SudoCaching,TimeProviders,ReplicationThroughRemovableMedia,HiddenFiles andDirectories,BITSJobs,DynamicDataExchange,CreateAccount,Launchctl,SystemFirmware,NetworkServiceScanning,ProcessDiscovery,ProcessInjection,PowerShell,Rundll32,InstallUtil,KernelModulesandExtensions,WebService,DylibHijacking,File SystemPermissionsWeakness,ExternalRemoteServices,Source,Two-FactorAuthenticationInterception,Exploitationof RemoteServices,PeripheralDeviceDiscovery,DisablingSecurityTools,UserExecution,ScreenCapture,ExtraWindowMemoryInjection,DomainFronting,Local JobScheduling,IndirectCommandExecution,ExecutionthroughAPI,ProcessDoppelgänging,LaunchAgent,ExfiltrationOverPhysicalMedium,SignedScriptProxyExecution,Multi-hopProxy,VideoCapture,FileDeletion,GraphicalUserInterface,PlistModification,Regsvcs/Regasm,LaunchDaemon,SystemInformationDiscovery,PasstheTicket,MultilayerEncryption,HiddenWindow,ServiceRegistryPermissionsWeakness,CommunicationThroughRemovableMedia,WindowsManagementInstrumentationEventSubscription,EmailCollection,InputCapture,CMSTP,AppInitDLLs,PermissionGroupsDiscovery,Exploitationfor DefenseEvasion,ValidAccounts,Deobfuscate/DecodeFiles or Information,PortKnocking,InstallRootCertificate,Hooking,File andDirectoryDiscovery,ObfuscatedFiles orInformation,AccountManipulation,ConnectionProxy,ExploitPublic-FacingApplication,Sudo,CredentialDumping,TaintSharedContent,ApplicationWindowDiscovery,RemoteSystemDiscovery,RedundantAccess,DataEncrypted,IndicatorBlocking,LC_MAINHijacking,LoginItem,NetworkShareConnectionRemoval,CommonlyUsed Port,Data fromInformationRepositories,AutomatedCollection,Multi-StageChannels,Mshta,SignedBinaryProxyExecution,DLLSide-Loading,SystemNetworkConfigurationDiscovery,SecuritydMemory,ScheduledTransfer,NetshHelperDLL,RemoteAccessTools,Regsvr32,DataObfuscation,LSASSDriver,CodeSigning,Re-openedApplications,ApplicationDeploymentSoftware,BrowserBookmarkDiscovery,FallbackChannels,BrowserExtensions,PrivateKeys,Man intheBrowser,Bootkit,ScheduledTask,LLMNR/NBT-NSPoisoning,ComponentFirmware,AppCertDLLs,NetworkShareDiscovery,StandardApplicationLayerProtocol,ComponentObjectModelHijacking,Supply ChainCompromise,AccessTokenManipulation,Trap,Masquerading,LogonScripts,ExploitationforCredentialAccess,Command-LineInterface,AccessibilityFeatures,FileSystemLogicalOffsets,NetworkSniffing,ServiceExecution,PathInterception,DistributedComponentObjectModel,Third-partySoftware,Screensaver,ApplicationShimming,Timestomp,ClipboardData,DataTransferSizeLimits,PasswordPolicyDiscovery,ExfiltrationOver OtherNetworkMedium,DCShadow,TrustedRelationship,Data fromRemovableMedia,LC_LOAD_DYLIBAddition,Kerberoasting,Drive-byCompromise,ForcedAuthentication,ModifyRegistry,Credentialsin Registry,Spearphishingvia Service,UncommonlyUsed Port,NewService,WindowsAdminShares,OfficeApplicationStartup,SoftwarePacking,PortMonitors,WindowsManagementInstrumentation,BypassUserAccountControl,ShortcutModification,PasswordFilterDLL,DataStaged,SystemTimeDiscovery,RemoteFileCopy,SpaceafterFilename,WindowsRemoteManagement,WinlogonHelperDLL,Hypervisor,HiddenUsers,HardwareAdditions,BinaryPadding,Rootkit,ExecutionthroughModuleLoad,AutomatedExfiltration,AppleScript,WebShell,SharedWebroot,Exploitationfor ClientExecution,PasstheHash,IndicatorRemovalfromTools,RegistryRun Keys/ StartFolder,StandardNon-ApplicationLayerProtocol,ControlPanelItems,Image FileExecutionOptionsInjection,ExfiltrationOverAlternativeProtocol,MultibandCommunication,.bash_profileand .bashrc,Data fromLocalSystem,ClearCommandHistory,SystemOwner/UserDiscovery,Rc.common,AccountDiscovery,HISTCONTROL,QueryRegistry,Data fromNetworkSharedDrive,StandardCryptographicProtocol,BruteForce,ChangeDefault FileAssociation,SystemServiceDiscovery,StartupItems,CustomCommandand ControlProtocol,Keychain,ExploitationforPrivilegeEscalation,SystemNetworkConnectionsDiscovery,NTFS FileAttributes,ProcessHollowing,SID-HistoryInjection,SetuidandSetgid,ModifyExistingService,RemoteDesktopProtocol,ExfiltrationOverCommandand ControlChannel,GatekeeperBypass,SpearphishingAttachment,DataEncoding,Credentialsin Files,DLLSearchOrderHijacking,SecuritySupportProvider,SecuritySoftwareDiscovery,SIP andTrustProviderHijacking,InputPrompt,AudioCapture,AuthenticationPackage,Scripting,DataCompressed,BashHistory,IndicatorRemovalon Host,SpearphishingLink,CustomCryptographicProtocol,TrustedDeveloperUtilities,RemoteServices,SSHHijacking,SudoCaching,TimeProviders,ReplicationThroughRemovableMedia,HiddenFiles andDirectories,BITSJobs,DynamicDataExchange,CreateAccount,Launchctl,SystemFirmware,NetworkServiceScanning,ProcessDiscovery,ProcessInjection,PowerShell,Rundll32,InstallUtil,KernelModulesandExtensions,WebService,DylibHijacking,File SystemPermissionsWeakness,ExternalRemoteServices,Source,Two-FactorAuthenticationInterception,Exploitationof RemoteServices,PeripheralDeviceDiscovery,DisablingSecurityTools,UserExecution,ScreenCapture,ExtraWindowMemoryInjection,DomainFronting,Local JobScheduling,IndirectCommandExecution,ExecutionthroughAPI,ProcessDoppelgänging,LaunchAgent,ExfiltrationOverPhysicalMedium,SignedScriptProxyExecution,Multi-hopProxy,VideoCapture,FileDeletion,GraphicalUserInterface,PlistModification,Regsvcs/Regasm,LaunchDaemon,SystemInformationDiscovery,PasstheTicket,MultilayerEncryption,HiddenWindow,ServiceRegistryPermissionsWeakness,CommunicationThroughRemovableMedia,WindowsManagementInstrumentationEventSubscription,EmailCollection,InputCapture,CMSTP,AppInitDLLs,PermissionGroupsDiscovery,Exploitationfor DefenseEvasion,ValidAccounts,Deobfuscate/DecodeFiles or Information,PortKnocking,InstallRootCertificate,Hooking,File andDirectoryDiscovery,ObfuscatedFiles orInformation,AccountManipulation,ConnectionProxy,ExploitPublic-FacingApplication,Sudo,CredentialDumping,TaintSharedContent,ApplicationWindowDiscovery,RemoteSystemDiscovery,RedundantAccess,DataEncrypted,IndicatorBlocking,LC_MAINHijacking,LoginItem,NetworkShareConnectionRemoval,CommonlyUsed Port,Data fromInformationRepositories,AutomatedCollection,Multi-StageChannels,Mshta,SignedBinaryProxyExecution,DLLSide-Loading,SystemNetworkConfigurationDiscovery,SecuritydMemory,ScheduledTransfer,NetshHelperDLL,RemoteAccessTools,Regsvr32,DataObfuscation,LSASSDriver,CodeSigning,Re-openedApplications,ApplicationDeploymentSoftware,BrowserBookmarkDiscovery,FallbackChannels,BrowserExtensions,PrivateKeys,Man intheBrowser,Bootkit,ScheduledTask,LLMNR/NBT-NSPoisoning,ComponentFirmware,AppCertDLLs,NetworkShareDiscovery,StandardApplicationLayerProtocol,ComponentObjectModelHijacking,Supply ChainCompromise,AccessTokenManipulation,Trap,Masquerading,LogonScripts,ExploitationforCredentialAccess,Command-LineInterface,AccessibilityFeatures,FileSystemLogicalOffsets,NetworkSniffing,ServiceExecution,PathInterception,DistributedComponentObjectModel,Third-partySoftware,Screensaver,ApplicationShimming,Timestomp,ClipboardData,DataTransferSizeLimits,PasswordPolicyDiscovery,ExfiltrationOver OtherNetworkMedium,DCShadow,TrustedRelationship,Data fromRemovableMedia,LC_LOAD_DYLIBAddition,Kerberoasting,Drive-byCompromise,ForcedAuthentication,ModifyRegistry,Credentialsin Registry,Spearphishingvia Service,UncommonlyUsed Port,NewService,WindowsAdminShares,OfficeApplicationStartup,SoftwarePacking,PortMonitors,WindowsManagementInstrumentation,BypassUserAccountControl,ShortcutModification,PasswordFilterDLL,DataStaged,SystemTimeDiscovery,RemoteFileCopy,SpaceafterFilename,WindowsRemoteManagement,WinlogonHelperDLL,Hypervisor,HiddenUsers,HardwareAdditions,BinaryPadding,Rootkit,ExecutionthroughModuleLoad,AutomatedExfiltration,AppleScript,WebShell,SharedWebroot,Exploitationfor ClientExecution,PasstheHash,IndicatorRemovalfromTools,RegistryRun Keys/ StartFolder,StandardNon-ApplicationLayerProtocol,ControlPanelItems,Image FileExecutionOptionsInjection,ExfiltrationOverAlternativeProtocol,MultibandCommunication,.bash_profileand .bashrc,Data fromLocalSystem,ClearCommandHistory,SystemOwner/UserDiscovery,Rc.common,AccountDiscovery,

Untitled Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
  1. HISTCONTROL,
  2. Query Registry,
  3. Data from Network Shared Drive,
  4. Standard Cryptographic Protocol,
  5. Brute Force,
  6. Change Default File Association,
  7. System Service Discovery,
  8. Startup Items,
  9. Custom Command and Control Protocol,
  10. Keychain,
  11. Exploitation for Privilege Escalation,
  12. System Network Connections Discovery,
  13. NTFS File Attributes,
  14. Process Hollowing,
  15. SID-History Injection,
  16. Setuid and Setgid,
  17. Modify Existing Service,
  18. Remote Desktop Protocol,
  19. Exfiltration Over Command and Control Channel,
  20. Gatekeeper Bypass,
  21. Spearphishing Attachment,
  22. Data Encoding,
  23. Credentials in Files,
  24. DLL Search Order Hijacking,
  25. Security Support Provider,
  26. Security Software Discovery,
  27. SIP and Trust Provider Hijacking,
  28. Input Prompt,
  29. Audio Capture,
  30. Authentication Package,
  31. Scripting,
  32. Data Compressed,
  33. Bash History,
  34. Indicator Removal on Host,
  35. Spearphishing Link,
  36. Custom Cryptographic Protocol,
  37. Trusted Developer Utilities,
  38. Remote Services,
  39. SSH Hijacking,
  40. Sudo Caching,
  41. Time Providers,
  42. Replication Through Removable Media,
  43. Hidden Files and Directories,
  44. BITS Jobs,
  45. Dynamic Data Exchange,
  46. Create Account,
  47. Launchctl,
  48. System Firmware,
  49. Network Service Scanning,
  50. Process Discovery,
  51. Process Injection,
  52. PowerShell,
  53. Rundll32,
  54. InstallUtil,
  55. Kernel Modules and Extensions,
  56. Web Service,
  57. Dylib Hijacking,
  58. File System Permissions Weakness,
  59. External Remote Services,
  60. Source,
  61. Two-Factor Authentication Interception,
  62. Exploitation of Remote Services,
  63. Peripheral Device Discovery,
  64. Disabling Security Tools,
  65. User Execution,
  66. Screen Capture,
  67. Extra Window Memory Injection,
  68. Domain Fronting,
  69. Local Job Scheduling,
  70. Indirect Command Execution,
  71. Execution through API,
  72. Process Doppelgänging,
  73. Launch Agent,
  74. Exfiltration Over Physical Medium,
  75. Signed Script Proxy Execution,
  76. Multi-hop Proxy,
  77. Video Capture,
  78. File Deletion,
  79. Graphical User Interface,
  80. Plist Modification,
  81. Regsvcs/Regasm,
  82. Launch Daemon,
  83. System Information Discovery,
  84. Pass the Ticket,
  85. Multilayer Encryption,
  86. Hidden Window,
  87. Service Registry Permissions Weakness,
  88. Communication Through Removable Media,
  89. Windows Management Instrumentation Event Subscription,
  90. Email Collection,
  91. Input Capture,
  92. CMSTP,
  93. AppInit DLLs,
  94. Permission Groups Discovery,
  95. Exploitation for Defense Evasion,
  96. Valid Accounts,
  97. Deobfuscate/Decode Files or Information,
  98. Port Knocking,
  99. Install Root Certificate,
  100. Hooking,
  101. File and Directory Discovery,
  102. Obfuscated Files or Information,
  103. Account Manipulation,
  104. Connection Proxy,
  105. Exploit Public-Facing Application,
  106. Sudo,
  107. Credential Dumping,
  108. Taint Shared Content,
  109. Application Window Discovery,
  110. Remote System Discovery,
  111. Redundant Access,
  112. Data Encrypted,
  113. Indicator Blocking,
  114. LC_MAIN Hijacking,
  115. Login Item,
  116. Network Share Connection Removal,
  117. Commonly Used Port,
  118. Data from Information Repositories,
  119. Automated Collection,
  120. Multi-Stage Channels,
  121. Mshta,
  122. Signed Binary Proxy Execution,
  123. DLL Side-Loading,
  124. System Network Configuration Discovery,
  125. Securityd Memory,
  126. Scheduled Transfer,
  127. Netsh Helper DLL,
  128. Remote Access Tools,
  129. Regsvr32,
  130. Data Obfuscation,
  131. LSASS Driver,
  132. Code Signing,
  133. Re-opened Applications,
  134. Application Deployment Software,
  135. Browser Bookmark Discovery,
  136. Fallback Channels,
  137. Browser Extensions,
  138. Private Keys,
  139. Man in the Browser,
  140. Bootkit,
  141. Scheduled Task,
  142. LLMNR/NBT-NS Poisoning,
  143. Component Firmware,
  144. AppCert DLLs,
  145. Network Share Discovery,
  146. Standard Application Layer Protocol,
  147. Component Object Model Hijacking,
  148. Supply Chain Compromise,
  149. Access Token Manipulation,
  150. Trap,
  151. Masquerading,
  152. Logon Scripts,
  153. Exploitation for Credential Access,
  154. Command-Line Interface,
  155. Accessibility Features,
  156. File System Logical Offsets,
  157. Network Sniffing,
  158. Service Execution,
  159. Path Interception,
  160. Distributed Component Object Model,
  161. Third-party Software,
  162. Screensaver,
  163. Application Shimming,
  164. Timestomp,
  165. Clipboard Data,
  166. Data Transfer Size Limits,
  167. Password Policy Discovery,
  168. Exfiltration Over Other Network Medium,
  169. DCShadow,
  170. Trusted Relationship,
  171. Data from Removable Media,
  172. LC_LOAD_DYLIB Addition,
  173. Kerberoasting,
  174. Drive-by Compromise,
  175. Forced Authentication,
  176. Modify Registry,
  177. Credentials in Registry,
  178. Spearphishing via Service,
  179. Uncommonly Used Port,
  180. New Service,
  181. Windows Admin Shares,
  182. Office Application Startup,
  183. Software Packing,
  184. Port Monitors,
  185. Windows Management Instrumentation,
  186. Bypass User Account Control,
  187. Shortcut Modification,
  188. Password Filter DLL,
  189. Data Staged,
  190. System Time Discovery,
  191. Remote File Copy,
  192. Space after Filename,
  193. Windows Remote Management,
  194. Winlogon Helper DLL,
  195. Hypervisor,
  196. Hidden Users,
  197. Hardware Additions,
  198. Binary Padding,
  199. Rootkit,
  200. Execution through Module Load,
  201. Automated Exfiltration,
  202. AppleScript,
  203. Web Shell,
  204. Shared Webroot,
  205. Exploitation for Client Execution,
  206. Pass the Hash,
  207. Indicator Removal from Tools,
  208. Registry Run Keys / Start Folder,
  209. Standard Non-Application Layer Protocol,
  210. Control Panel Items,
  211. Image File Execution Options Injection,
  212. Exfiltration Over Alternative Protocol,
  213. Multiband Communication,
  214. .bash_profile and .bashrc,
  215. Data from Local System,
  216. Clear Command History,
  217. System Owner/User Discovery,
  218. Rc.common,
  219. Account Discovery,