PUA/PUPPASSWORDINTEGRITYPURPLETEAMEXPLOITPCIBLUETEAMCLOUD-BASEDSIEMON-PREMBOTNETROOTKITBYODNOCGRAYHATHONEYPOTKEYLOGGERSPEARPHISHMACHINELEARNINGPHISHEPPDOMAINSOCIALENGINEERINGAIBLACKHATHEADERSZOMBIEUBAIOTBRUTEFORCEATTACKAVAILABILITYWORMSOCMETADATAPATCHSOARZERO-DAYCONFIDENTIALITYATTACKSURFACEANOMALYBREACHDMZSPOOFINGRANSOMWAREKILLCHAINVULNERABILITYEDRAPTDDoSPENTESTTHREATINTELLIGENCEREDTEAMENCRYPTIONFIREWALLWHITEHATTHREATHUNTINGVPNC2CIOT2FAPUA/PUPPASSWORDINTEGRITYPURPLETEAMEXPLOITPCIBLUETEAMCLOUD-BASEDSIEMON-PREMBOTNETROOTKITBYODNOCGRAYHATHONEYPOTKEYLOGGERSPEARPHISHMACHINELEARNINGPHISHEPPDOMAINSOCIALENGINEERINGAIBLACKHATHEADERSZOMBIEUBAIOTBRUTEFORCEATTACKAVAILABILITYWORMSOCMETADATAPATCHSOARZERO-DAYCONFIDENTIALITYATTACKSURFACEANOMALYBREACHDMZSPOOFINGRANSOMWAREKILLCHAINVULNERABILITYEDRAPTDDoSPENTESTTHREATINTELLIGENCEREDTEAMENCRYPTIONFIREWALLWHITEHATTHREATHUNTINGVPNC2CIOT2FA

InfoSec Bingo - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
  1. PUA/PUP
  2. PASSWORD
  3. INTEGRITY
  4. PURPLE TEAM
  5. EXPLOIT
  6. PCI
  7. BLUE TEAM
  8. CLOUD-BASED
  9. SIEM
  10. ON-PREM
  11. BOTNET
  12. ROOTKIT
  13. BYOD
  14. NOC
  15. GRAYHAT
  16. HONEYPOT
  17. KEYLOGGER
  18. SPEARPHISH
  19. MACHINE LEARNING
  20. PHISH
  21. EPP
  22. DOMAIN
  23. SOCIAL ENGINEERING
  24. AI
  25. BLACKHAT
  26. HEADERS
  27. ZOMBIE
  28. UBA
  29. IOT
  30. BRUTE FORCE ATTACK
  31. AVAILABILITY
  32. WORM
  33. SOC
  34. METADATA
  35. PATCH
  36. SOAR
  37. ZERO-DAY
  38. CONFIDENTIALITY
  39. ATTACK SURFACE
  40. ANOMALY
  41. BREACH
  42. DMZ
  43. SPOOFING
  44. RANSOMWARE
  45. KILL CHAIN
  46. VULNERABILITY
  47. EDR
  48. APT
  49. DDoS
  50. PENTEST
  51. THREAT INTELLIGENCE
  52. RED TEAM
  53. ENCRYPTION
  54. FIREWALL
  55. WHITEHAT
  56. THREAT HUNTING
  57. VPN
  58. C2C
  59. IOT
  60. 2FA