ROOTKITC2CSOCIALENGINEERINGWHITEHATPASSWORDTHREATHUNTINGSOCCONFIDENTIALITYSPOOFINGENCRYPTION2FAPENTESTSIEMGRAYHATIOTEPPBREACHON-PREMZERO-DAYCLOUD-BASEDDOMAINDMZWORMATTACKSURFACEUBABOTNETNOCEXPLOITPUA/PUPEDRSOARKEYLOGGERIOTPATCHPHISHPURPLETEAMANOMALYMETADATABYODVPNSPEARPHISHRANSOMWARETHREATINTELLIGENCEVULNERABILITYMACHINELEARNINGINTEGRITYHONEYPOTFIREWALLDDoSBLACKHATZOMBIEAVAILABILITYAPTHEADERSBLUETEAMAIBRUTEFORCEATTACKKILLCHAINREDTEAMPCIROOTKITC2CSOCIALENGINEERINGWHITEHATPASSWORDTHREATHUNTINGSOCCONFIDENTIALITYSPOOFINGENCRYPTION2FAPENTESTSIEMGRAYHATIOTEPPBREACHON-PREMZERO-DAYCLOUD-BASEDDOMAINDMZWORMATTACKSURFACEUBABOTNETNOCEXPLOITPUA/PUPEDRSOARKEYLOGGERIOTPATCHPHISHPURPLETEAMANOMALYMETADATABYODVPNSPEARPHISHRANSOMWARETHREATINTELLIGENCEVULNERABILITYMACHINELEARNINGINTEGRITYHONEYPOTFIREWALLDDoSBLACKHATZOMBIEAVAILABILITYAPTHEADERSBLUETEAMAIBRUTEFORCEATTACKKILLCHAINREDTEAMPCI

InfoSec Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
  1. ROOTKIT
  2. C2C
  3. SOCIAL ENGINEERING
  4. WHITEHAT
  5. PASSWORD
  6. THREAT HUNTING
  7. SOC
  8. CONFIDENTIALITY
  9. SPOOFING
  10. ENCRYPTION
  11. 2FA
  12. PENTEST
  13. SIEM
  14. GRAYHAT
  15. IOT
  16. EPP
  17. BREACH
  18. ON-PREM
  19. ZERO-DAY
  20. CLOUD-BASED
  21. DOMAIN
  22. DMZ
  23. WORM
  24. ATTACK SURFACE
  25. UBA
  26. BOTNET
  27. NOC
  28. EXPLOIT
  29. PUA/PUP
  30. EDR
  31. SOAR
  32. KEYLOGGER
  33. IOT
  34. PATCH
  35. PHISH
  36. PURPLE TEAM
  37. ANOMALY
  38. METADATA
  39. BYOD
  40. VPN
  41. SPEARPHISH
  42. RANSOMWARE
  43. THREAT INTELLIGENCE
  44. VULNERABILITY
  45. MACHINE LEARNING
  46. INTEGRITY
  47. HONEYPOT
  48. FIREWALL
  49. DDoS
  50. BLACKHAT
  51. ZOMBIE
  52. AVAILABILITY
  53. APT
  54. HEADERS
  55. BLUE TEAM
  56. AI
  57. BRUTE FORCE ATTACK
  58. KILL CHAIN
  59. RED TEAM
  60. PCI