DirectoryTraversalInsecureAPIsTrojanHorseMan-in-the-Middle(MITM)Denial ofService(DoS)PhishingPrivilegeEscalationBufferOverflowMalwareWeakPasswordsBruteForceAttackPhishingInsiderThreatZero-DayExploitBackdoorDenial ofService(DoS)BruteForceAttackTrojanHorsePhishingDirectoryTraversalSQLInjectionCryptojackingInsecureAPIsRemoteCodeExecution(RCE)BackdoorSocialEngineeringRansomwareDDoSAttackCross-SiteScripting(XSS)InsiderThreatUnpatchedSoftwareWeakPasswordsMalwareSocialEngineeringDDoSAttackMan-in-the-Middle(MITM)DataBreachBufferOverflowRemoteCodeExecution(RCE)SessionHijackingZero-DayExploitUnpatchedSoftwareDataBreachSQLInjectionRansomwareSessionHijackingCross-SiteScripting(XSS)PrivilegeEscalationCryptojackingDirectoryTraversalInsecureAPIsTrojanHorseMan-in-the-Middle(MITM)Denial ofService(DoS)PhishingPrivilegeEscalationBufferOverflowMalwareWeakPasswordsBruteForceAttackPhishingInsiderThreatZero-DayExploitBackdoorDenial ofService(DoS)BruteForceAttackTrojanHorsePhishingDirectoryTraversalSQLInjectionCryptojackingInsecureAPIsRemoteCodeExecution(RCE)BackdoorSocialEngineeringRansomwareDDoSAttackCross-SiteScripting(XSS)InsiderThreatUnpatchedSoftwareWeakPasswordsMalwareSocialEngineeringDDoSAttackMan-in-the-Middle(MITM)DataBreachBufferOverflowRemoteCodeExecution(RCE)SessionHijackingZero-DayExploitUnpatchedSoftwareDataBreachSQLInjectionRansomwareSessionHijackingCross-SiteScripting(XSS)PrivilegeEscalationCryptojacking

Patch แตก!แหก!กระจาย!! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
  1. Directory Traversal
  2. Insecure APIs
  3. Trojan Horse
  4. Man-in-the-Middle (MITM)
  5. Denial of Service (DoS)
  6. Phishing
  7. Privilege Escalation
  8. Buffer Overflow
  9. Malware
  10. Weak Passwords
  11. Brute Force Attack
  12. Phishing
  13. Insider Threat
  14. Zero-Day Exploit
  15. Backdoor
  16. Denial of Service (DoS)
  17. Brute Force Attack
  18. Trojan Horse
  19. Phishing
  20. Directory Traversal
  21. SQL Injection
  22. Cryptojacking
  23. Insecure APIs
  24. Remote Code Execution (RCE)
  25. Backdoor
  26. Social Engineering
  27. Ransomware
  28. DDoS Attack
  29. Cross-Site Scripting (XSS)
  30. Insider Threat
  31. Unpatched Software
  32. Weak Passwords
  33. Malware
  34. Social Engineering
  35. DDoS Attack
  36. Man-in-the-Middle (MITM)
  37. Data Breach
  38. Buffer Overflow
  39. Remote Code Execution (RCE)
  40. Session Hijacking
  41. Zero-Day Exploit
  42. Unpatched Software
  43. Data Breach
  44. SQL Injection
  45. Ransomware
  46. Session Hijacking
  47. Cross-Site Scripting (XSS)
  48. Privilege Escalation
  49. Cryptojacking