Brute Force Attack Weak Passwords DDoS Attack Privilege Escalation Data Breach Cross- Site Scripting (XSS) Social Engineering Zero- Day Exploit Unpatched Software SQL Injection Insecure APIs Ransomware Session Hijacking Remote Code Execution (RCE) Backdoor Buffer Overflow Man-in- the- Middle (MITM) Directory Traversal Denial of Service (DoS) Trojan Horse Phishing Insider Threat Cryptojacking Malware Brute Force Attack Weak Passwords DDoS Attack Privilege Escalation Data Breach Cross- Site Scripting (XSS) Social Engineering Zero- Day Exploit Unpatched Software SQL Injection Insecure APIs Ransomware Session Hijacking Remote Code Execution (RCE) Backdoor Buffer Overflow Man-in- the- Middle (MITM) Directory Traversal Denial of Service (DoS) Trojan Horse Phishing Insider Threat Cryptojacking Malware
(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.
Brute Force Attack
Weak Passwords
DDoS Attack
Privilege Escalation
Data Breach
Cross-Site Scripting (XSS)
Social Engineering
Zero-Day Exploit
Unpatched Software
SQL Injection
Insecure APIs
Ransomware
Session Hijacking
Remote Code Execution (RCE)
Backdoor
Buffer Overflow
Man-in-the-Middle (MITM)
Directory Traversal
Denial of Service (DoS)
Trojan Horse
Phishing
Insider Threat
Cryptojacking
Malware