BruteForceAttackWeakPasswordsDDoSAttackPrivilegeEscalationDataBreachCross-SiteScripting(XSS)SocialEngineeringZero-DayExploitUnpatchedSoftwareSQLInjectionInsecureAPIsRansomwareSessionHijackingRemoteCodeExecution(RCE)BackdoorBufferOverflowMan-in-the-Middle(MITM)DirectoryTraversalDenial ofService(DoS)TrojanHorsePhishingInsiderThreatCryptojackingMalwareBruteForceAttackWeakPasswordsDDoSAttackPrivilegeEscalationDataBreachCross-SiteScripting(XSS)SocialEngineeringZero-DayExploitUnpatchedSoftwareSQLInjectionInsecureAPIsRansomwareSessionHijackingRemoteCodeExecution(RCE)BackdoorBufferOverflowMan-in-the-Middle(MITM)DirectoryTraversalDenial ofService(DoS)TrojanHorsePhishingInsiderThreatCryptojackingMalware

Patch แตก!แหก!กระจาย!! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Brute Force Attack
  2. Weak Passwords
  3. DDoS Attack
  4. Privilege Escalation
  5. Data Breach
  6. Cross-Site Scripting (XSS)
  7. Social Engineering
  8. Zero-Day Exploit
  9. Unpatched Software
  10. SQL Injection
  11. Insecure APIs
  12. Ransomware
  13. Session Hijacking
  14. Remote Code Execution (RCE)
  15. Backdoor
  16. Buffer Overflow
  17. Man-in-the-Middle (MITM)
  18. Directory Traversal
  19. Denial of Service (DoS)
  20. Trojan Horse
  21. Phishing
  22. Insider Threat
  23. Cryptojacking
  24. Malware