SQLInjectionPrivilegeEscalationSocialEngineeringPhishingBruteForceAttackSessionHijackingPrivilegeEscalationPhishingDirectoryTraversalDirectoryTraversalBufferOverflowInsiderThreatDataBreachRansomwareBruteForceAttackBufferOverflowZero-DayExploitRansomwareMan-in-the-Middle(MITM)InsecureAPIsBackdoorMalwareInsiderThreatPhishingDenial ofService(DoS)SQLInjectionSessionHijackingRemoteCodeExecution(RCE)TrojanHorseTrojanHorseZero-DayExploitUnpatchedSoftwareDenial ofService(DoS)MalwareDataBreachBackdoorUnpatchedSoftwareInsecureAPIsCross-SiteScripting(XSS)WeakPasswordsRemoteCodeExecution(RCE)DDoSAttackCross-SiteScripting(XSS)WeakPasswordsSocialEngineeringDDoSAttackMan-in-the-Middle(MITM)CryptojackingCryptojackingSQLInjectionPrivilegeEscalationSocialEngineeringPhishingBruteForceAttackSessionHijackingPrivilegeEscalationPhishingDirectoryTraversalDirectoryTraversalBufferOverflowInsiderThreatDataBreachRansomwareBruteForceAttackBufferOverflowZero-DayExploitRansomwareMan-in-the-Middle(MITM)InsecureAPIsBackdoorMalwareInsiderThreatPhishingDenial ofService(DoS)SQLInjectionSessionHijackingRemoteCodeExecution(RCE)TrojanHorseTrojanHorseZero-DayExploitUnpatchedSoftwareDenial ofService(DoS)MalwareDataBreachBackdoorUnpatchedSoftwareInsecureAPIsCross-SiteScripting(XSS)WeakPasswordsRemoteCodeExecution(RCE)DDoSAttackCross-SiteScripting(XSS)WeakPasswordsSocialEngineeringDDoSAttackMan-in-the-Middle(MITM)CryptojackingCryptojacking

Patch แตก!แหก!กระจาย!! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
  1. SQL Injection
  2. Privilege Escalation
  3. Social Engineering
  4. Phishing
  5. Brute Force Attack
  6. Session Hijacking
  7. Privilege Escalation
  8. Phishing
  9. Directory Traversal
  10. Directory Traversal
  11. Buffer Overflow
  12. Insider Threat
  13. Data Breach
  14. Ransomware
  15. Brute Force Attack
  16. Buffer Overflow
  17. Zero-Day Exploit
  18. Ransomware
  19. Man-in-the-Middle (MITM)
  20. Insecure APIs
  21. Backdoor
  22. Malware
  23. Insider Threat
  24. Phishing
  25. Denial of Service (DoS)
  26. SQL Injection
  27. Session Hijacking
  28. Remote Code Execution (RCE)
  29. Trojan Horse
  30. Trojan Horse
  31. Zero-Day Exploit
  32. Unpatched Software
  33. Denial of Service (DoS)
  34. Malware
  35. Data Breach
  36. Backdoor
  37. Unpatched Software
  38. Insecure APIs
  39. Cross-Site Scripting (XSS)
  40. Weak Passwords
  41. Remote Code Execution (RCE)
  42. DDoS Attack
  43. Cross-Site Scripting (XSS)
  44. Weak Passwords
  45. Social Engineering
  46. DDoS Attack
  47. Man-in-the-Middle (MITM)
  48. Cryptojacking
  49. Cryptojacking