Active Directory Medium Difficulty Custom CMS Ruby CVE Json Custom Source code NoSQLi common password LFI C language RCE Reverse engineering SQLI Robots.txt Unix Dotnet SSTI ssh enabled Wordpress Broken Access Control Premade CMS Windows Redis Broken Box (patch needed) Python Docker or Containers SQL can run command as sudo metasploit anonymous SMB Zero Day Vuln JavaScript Subdomains PHP FTP Ethereum Tunneling Easy Difficulty non hashed secrets Deserialization Java API Vulnerability Crypto Active Directory Medium Difficulty Custom CMS Ruby CVE Json Custom Source code NoSQLi common password LFI C language RCE Reverse engineering SQLI Robots.txt Unix Dotnet SSTI ssh enabled Wordpress Broken Access Control Premade CMS Windows Redis Broken Box (patch needed) Python Docker or Containers SQL can run command as sudo metasploit anonymous SMB Zero Day Vuln JavaScript Subdomains PHP FTP Ethereum Tunneling Easy Difficulty non hashed secrets Deserialization Java API Vulnerability Crypto
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Active Directory
Medium Difficulty
Custom CMS
Ruby
CVE
Json
Custom Source code
NoSQLi
common password
LFI
C language
RCE
Reverse engineering
SQLI
Robots.txt
Unix
Dotnet
SSTI
ssh enabled
Wordpress
Broken Access Control
Premade CMS
Windows
Redis
Broken Box (patch needed)
Python
Docker or Containers
SQL
can run command as sudo
metasploit
anonymous SMB
Zero Day Vuln
JavaScript
Subdomains
PHP
FTP
Ethereum
Tunneling
Easy Difficulty
non hashed secrets
Deserialization
Java
API Vulnerability
Crypto