(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
Security Software Discovery,
Exfiltration Over Physical Medium,
Standard Non-Application Layer Protocol,
Extra Window Memory Injection,
Data Staged,
Communication Through Removable Media,
Port Knocking,
Custom Cryptographic Protocol,
Process Doppelgänging,
Drive-by Compromise,
Input Prompt,
Scripting,
Bash History,
Screen Capture,
Forced Authentication,
Gatekeeper Bypass,
Browser Extensions,
Video Capture,
Graphical User Interface,
Account Manipulation,
Exploit Public-Facing Application,
Security Support Provider,
Create Account,
Obfuscated Files or Information,
Fallback Channels,
Service Execution,
Exfiltration Over Alternative Protocol,
Image File Execution Options Injection,
Standard Cryptographic Protocol,
Application Deployment Software,
AppInit DLLs,
Binary Padding,
Credentials in Registry,
File and Directory Discovery,
Disabling Security Tools,
Indicator Blocking,
InstallUtil,
Valid Accounts,
Launchctl,
System Information Discovery,
Screensaver,
Commonly Used Port,
Securityd Memory,
Modify Existing Service,
Indirect Command Execution,
Rootkit,
Kernel Modules and Extensions,
Install Root Certificate,
Software Packing,
Mshta,
Trap,
Network Sniffing,
Permission Groups Discovery,
Dynamic Data Exchange,
Data Transfer Size Limits,
Space after Filename,
Pass the Ticket,
File System Logical Offsets,
Input Capture,
Data Encoding,
Account Discovery,
System Network Configuration Discovery,
Signed Binary Proxy Execution,
Launch Daemon,
LC_LOAD_DYLIB Addition,
LC_MAIN Hijacking,
Remote File Copy,
Login Item,
Process Injection,
Windows Admin Shares,
Exploitation for Defense Evasion,
System Owner/User Discovery,
Signed Script Proxy Execution,
Hidden Window,
System Network Connections Discovery,
DLL Side-Loading,
Shared Webroot,
Remote Desktop Protocol,
Startup Items,
Launch Agent,
CMSTP,
Kerberoasting,
Connection Proxy,
Shortcut Modification,
Time Providers,
PowerShell,
Private Keys,
Data from Removable Media,
Taint Shared Content,
Email Collection,
Scheduled Transfer,
Brute Force,
Windows Remote Management,
Masquerading,
Registry Run Keys / Start Folder,
Multiband Communication,
Plist Modification,
Spearphishing Attachment,
Audio Capture,
Multi-Stage Channels,
Hypervisor,
AppCert DLLs,
Replication Through Removable Media,
Dylib Hijacking,
Path Interception,
Rundll32,
DCShadow,
Change Default File Association,
Domain Fronting,
Regsvr32,
Spearphishing via Service,
Accessibility Features,
Code Signing,
Network Service Scanning,
BITS Jobs,
Exploitation for Credential Access,
Network Share Discovery,
Uncommonly Used Port,
System Firmware,
Remote System Discovery,
Scheduled Task,
New Service,
Automated Exfiltration,
Application Shimming,
Clear Command History,
Modify Registry,
Indicator Removal on Host,
File Deletion,
Access Token Manipulation,
Hardware Additions,
Setuid and Setgid,
Office Application Startup,
Keychain,
Hidden Files and Directories,
Data Encrypted,
Data Compressed,
Browser Bookmark Discovery,
Spearphishing Link,
Execution through API,
Credentials in Files,
Exploitation of Remote Services,
Port Monitors,
Regsvcs/Regasm,
Netsh Helper DLL,
Process Hollowing,
Multi-hop Proxy,
Local Job Scheduling,
Two-Factor Authentication Interception,
Logon Scripts,
Service Registry Permissions Weakness,
Network Share Connection Removal,
Indicator Removal from Tools,
File System Permissions Weakness,
Third-party Software,
Standard Application Layer Protocol,
User Execution,
Application Window Discovery,
Custom Command and Control Protocol,
DLL Search Order Hijacking,
Hooking,
Winlogon Helper DLL,
Clipboard Data,
Execution through Module Load,
NTFS File Attributes,
HISTCONTROL,
LLMNR/NBT-NS Poisoning,
Password Policy Discovery,
SSH Hijacking,
Query Registry,
Authentication Package,
Component Firmware,
Remote Access Tools,
Exploitation for Privilege Escalation,
Windows Management Instrumentation,
Process Discovery,
Timestomp,
Control Panel Items,
Command-Line Interface,
Hidden Users,
Source,
Sudo,
Rc.common,
Sudo Caching,
Trusted Relationship,
Data from Information Repositories,
AppleScript,
Exploitation for Client Execution,
External Remote Services,
Deobfuscate/Decode Files or Information,
Exfiltration Over Command and Control Channel,
System Time Discovery,
Windows Management Instrumentation Event Subscription,