SQL Injection Privilege Escalation Social Engineering Phishing Brute Force Attack Session Hijacking Privilege Escalation Phishing Directory Traversal Directory Traversal Buffer Overflow Insider Threat Data Breach Ransomware Brute Force Attack Buffer Overflow Zero- Day Exploit Ransomware Man-in- the- Middle (MITM) Insecure APIs Backdoor Malware Insider Threat Phishing Denial of Service (DoS) SQL Injection Session Hijacking Remote Code Execution (RCE) Trojan Horse Trojan Horse Zero- Day Exploit Unpatched Software Denial of Service (DoS) Malware Data Breach Backdoor Unpatched Software Insecure APIs Cross- Site Scripting (XSS) Weak Passwords Remote Code Execution (RCE) DDoS Attack Cross- Site Scripting (XSS) Weak Passwords Social Engineering DDoS Attack Man-in- the- Middle (MITM) Cryptojacking Cryptojacking SQL Injection Privilege Escalation Social Engineering Phishing Brute Force Attack Session Hijacking Privilege Escalation Phishing Directory Traversal Directory Traversal Buffer Overflow Insider Threat Data Breach Ransomware Brute Force Attack Buffer Overflow Zero- Day Exploit Ransomware Man-in- the- Middle (MITM) Insecure APIs Backdoor Malware Insider Threat Phishing Denial of Service (DoS) SQL Injection Session Hijacking Remote Code Execution (RCE) Trojan Horse Trojan Horse Zero- Day Exploit Unpatched Software Denial of Service (DoS) Malware Data Breach Backdoor Unpatched Software Insecure APIs Cross- Site Scripting (XSS) Weak Passwords Remote Code Execution (RCE) DDoS Attack Cross- Site Scripting (XSS) Weak Passwords Social Engineering DDoS Attack Man-in- the- Middle (MITM) Cryptojacking Cryptojacking
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
SQL Injection
Privilege Escalation
Social Engineering
Phishing
Brute Force Attack
Session Hijacking
Privilege Escalation
Phishing
Directory Traversal
Directory Traversal
Buffer Overflow
Insider Threat
Data Breach
Ransomware
Brute Force Attack
Buffer Overflow
Zero-Day Exploit
Ransomware
Man-in-the-Middle (MITM)
Insecure APIs
Backdoor
Malware
Insider Threat
Phishing
Denial of Service (DoS)
SQL Injection
Session Hijacking
Remote Code Execution (RCE)
Trojan Horse
Trojan Horse
Zero-Day Exploit
Unpatched Software
Denial of Service (DoS)
Malware
Data Breach
Backdoor
Unpatched Software
Insecure APIs
Cross-Site Scripting (XSS)
Weak Passwords
Remote Code Execution (RCE)
DDoS Attack
Cross-Site Scripting (XSS)
Weak Passwords
Social Engineering
DDoS Attack
Man-in-the-Middle (MITM)
Cryptojacking
Cryptojacking