Directory Traversal Insecure APIs Trojan Horse Man-in- the- Middle (MITM) Denial of Service (DoS) Phishing Privilege Escalation Buffer Overflow Malware Weak Passwords Brute Force Attack Phishing Insider Threat Zero- Day Exploit Backdoor Denial of Service (DoS) Brute Force Attack Trojan Horse Phishing Directory Traversal SQL Injection Cryptojacking Insecure APIs Remote Code Execution (RCE) Backdoor Social Engineering Ransomware DDoS Attack Cross- Site Scripting (XSS) Insider Threat Unpatched Software Weak Passwords Malware Social Engineering DDoS Attack Man-in- the- Middle (MITM) Data Breach Buffer Overflow Remote Code Execution (RCE) Session Hijacking Zero- Day Exploit Unpatched Software Data Breach SQL Injection Ransomware Session Hijacking Cross- Site Scripting (XSS) Privilege Escalation Cryptojacking Directory Traversal Insecure APIs Trojan Horse Man-in- the- Middle (MITM) Denial of Service (DoS) Phishing Privilege Escalation Buffer Overflow Malware Weak Passwords Brute Force Attack Phishing Insider Threat Zero- Day Exploit Backdoor Denial of Service (DoS) Brute Force Attack Trojan Horse Phishing Directory Traversal SQL Injection Cryptojacking Insecure APIs Remote Code Execution (RCE) Backdoor Social Engineering Ransomware DDoS Attack Cross- Site Scripting (XSS) Insider Threat Unpatched Software Weak Passwords Malware Social Engineering DDoS Attack Man-in- the- Middle (MITM) Data Breach Buffer Overflow Remote Code Execution (RCE) Session Hijacking Zero- Day Exploit Unpatched Software Data Breach SQL Injection Ransomware Session Hijacking Cross- Site Scripting (XSS) Privilege Escalation Cryptojacking
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Directory Traversal
Insecure APIs
Trojan Horse
Man-in-the-Middle (MITM)
Denial of Service (DoS)
Phishing
Privilege Escalation
Buffer Overflow
Malware
Weak Passwords
Brute Force Attack
Phishing
Insider Threat
Zero-Day Exploit
Backdoor
Denial of Service (DoS)
Brute Force Attack
Trojan Horse
Phishing
Directory Traversal
SQL Injection
Cryptojacking
Insecure APIs
Remote Code Execution (RCE)
Backdoor
Social Engineering
Ransomware
DDoS Attack
Cross-Site Scripting (XSS)
Insider Threat
Unpatched Software
Weak Passwords
Malware
Social Engineering
DDoS Attack
Man-in-the-Middle (MITM)
Data Breach
Buffer Overflow
Remote Code Execution (RCE)
Session Hijacking
Zero-Day Exploit
Unpatched Software
Data Breach
SQL Injection
Ransomware
Session Hijacking
Cross-Site Scripting (XSS)
Privilege Escalation
Cryptojacking