ActiveDirectoryMediumDifficultyCustomCMSRubyCVEJsonCustomSourcecodeNoSQLicommonpasswordLFIClanguageRCEReverseengineeringSQLIRobots.txtUnixDotnetSSTIsshenabledWordpressBrokenAccessControlPremadeCMSWindowsRedisBrokenBox(patchneeded)PythonDocker orContainersSQLcan runcommandas sudometasploitanonymousSMBZeroDayVulnJavaScriptSubdomainsPHPFTPEthereumTunnelingEasyDifficultynonhashedsecretsDeserializationJavaAPIVulnerabilityCryptoActiveDirectoryMediumDifficultyCustomCMSRubyCVEJsonCustomSourcecodeNoSQLicommonpasswordLFIClanguageRCEReverseengineeringSQLIRobots.txtUnixDotnetSSTIsshenabledWordpressBrokenAccessControlPremadeCMSWindowsRedisBrokenBox(patchneeded)PythonDocker orContainersSQLcan runcommandas sudometasploitanonymousSMBZeroDayVulnJavaScriptSubdomainsPHPFTPEthereumTunnelingEasyDifficultynonhashedsecretsDeserializationJavaAPIVulnerabilityCrypto

HTB Bingo!! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
  1. Active Directory
  2. Medium Difficulty
  3. Custom CMS
  4. Ruby
  5. CVE
  6. Json
  7. Custom Source code
  8. NoSQLi
  9. common password
  10. LFI
  11. C language
  12. RCE
  13. Reverse engineering
  14. SQLI
  15. Robots.txt
  16. Unix
  17. Dotnet
  18. SSTI
  19. ssh enabled
  20. Wordpress
  21. Broken Access Control
  22. Premade CMS
  23. Windows
  24. Redis
  25. Broken Box (patch needed)
  26. Python
  27. Docker or Containers
  28. SQL
  29. can run command as sudo
  30. metasploit
  31. anonymous SMB
  32. Zero Day Vuln
  33. JavaScript
  34. Subdomains
  35. PHP
  36. FTP
  37. Ethereum
  38. Tunneling
  39. Easy Difficulty
  40. non hashed secrets
  41. Deserialization
  42. Java
  43. API Vulnerability
  44. Crypto