Users are local admins SMB signing not enabled No SPF record Stale users older than 1year Wireless PSK older than 2 years untrained clickers EDR Missing on endpoint rogue device Inapproprite Firewall rules (not RDP) No botnet filter LLMNR enabled min password length < 12 characters password spreadsheet No MFA on 365 Admin cpassword >20% phish click rate Computers not joined to AD (or AAD) Individual user permissions in shares Default admin credentials inappropriate unconstrained delegation in Active Directory legacy configuration not removed VPN with weak encryption Unpatched Exchange password complexity not enforced Windows 7 No Geo-IP blocking Default SNMP Write value Unlicensed hardware or software Windows Server 2003/2008 Windows XP No DMZ (where appropriate) critically out-of- date firmware DNS logging not enabled compliance violation PCI violation Telnet LM Hash on admin Plain text password discovered in share No DKIM / DMARC NIPS disabled /unconfigured Whitelisted domains in email filter Teamviewer / VNC Segmentation without ACLs No drive encryption Adobe Flash unencrypted backups End user Passwords that never expire insecure zone transfers VM without autostart unauthenticated mail relay "Domain Users" group as local administrator No backup failure alerts GPO with insecure settings Bypass users in DUO Winlogon cache default value unencrypted web management interface Guest SSID but no guest isolation No redundant ISP Application with > 1000 vulnerabilities Insecure share with PII/PHI Users are local admins SMB signing not enabled No SPF record Stale users older than 1year Wireless PSK older than 2 years untrained clickers EDR Missing on endpoint rogue device Inapproprite Firewall rules (not RDP) No botnet filter LLMNR enabled min password length < 12 characters password spreadsheet No MFA on 365 Admin cpassword >20% phish click rate Computers not joined to AD (or AAD) Individual user permissions in shares Default admin credentials inappropriate unconstrained delegation in Active Directory legacy configuration not removed VPN with weak encryption Unpatched Exchange password complexity not enforced Windows 7 No Geo-IP blocking Default SNMP Write value Unlicensed hardware or software Windows Server 2003/2008 Windows XP No DMZ (where appropriate) critically out-of- date firmware DNS logging not enabled compliance violation PCI violation Telnet LM Hash on admin Plain text password discovered in share No DKIM / DMARC NIPS disabled /unconfigured Whitelisted domains in email filter Teamviewer / VNC Segmentation without ACLs No drive encryption Adobe Flash unencrypted backups End user Passwords that never expire insecure zone transfers VM without autostart unauthenticated mail relay "Domain Users" group as local administrator No backup failure alerts GPO with insecure settings Bypass users in DUO Winlogon cache default value unencrypted web management interface Guest SSID but no guest isolation No redundant ISP Application with > 1000 vulnerabilities Insecure share with PII/PHI
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Users are local admins
SMB signing
not enabled
No SPF record
Stale users older than 1year
Wireless PSK older than 2 years
untrained clickers
EDR
Missing on endpoint
rogue device
Inapproprite Firewall rules (not RDP)
No botnet
filter
LLMNR enabled
min password length < 12 characters
password spreadsheet
No MFA on
365 Admin
cpassword
>20% phish click rate
Computers
not
joined to
AD (or AAD)
Individual user permissions in shares
Default admin credentials
inappropriate unconstrained delegation in Active Directory
legacy configuration
not removed
VPN with weak encryption
Unpatched Exchange
password complexity not enforced
Windows 7
No Geo-IP blocking
Default SNMP Write value
Unlicensed
hardware or software
Windows Server 2003/2008
Windows XP
No DMZ
(where appropriate)
critically out-of-date firmware
DNS logging not enabled
compliance violation
PCI violation
Telnet
LM Hash on admin
Plain text password discovered in share
No DKIM / DMARC
NIPS
disabled
/unconfigured
Whitelisted domains in email filter
Teamviewer / VNC
Segmentation without ACLs
No drive encryption
Adobe Flash
unencrypted backups
End user
Passwords that never expire
insecure zone transfers
VM without autostart
unauthenticated
mail relay
"Domain Users" group as local administrator
No backup
failure alerts
GPO with insecure settings
Bypass users in DUO
Winlogon cache default value
unencrypted web management interface
Guest SSID but no guest isolation
No redundant ISP
Application
with > 1000 vulnerabilities
Insecure share with PII/PHI