UnpatchedSoftwareTrojanHorsePhishingSQLInjectionWeakPasswordsZero-DayExploitMan-in-the-Middle(MITM)RemoteCodeExecution(RCE)InsiderThreatInsecureAPIsBruteForceAttackDirectoryTraversalPrivilegeEscalationBufferOverflowCryptojackingSessionHijackingDenial ofService(DoS)DDoSAttackBackdoorCross-SiteScripting(XSS)SocialEngineeringRansomwareDataBreachMalwareUnpatchedSoftwareTrojanHorsePhishingSQLInjectionWeakPasswordsZero-DayExploitMan-in-the-Middle(MITM)RemoteCodeExecution(RCE)InsiderThreatInsecureAPIsBruteForceAttackDirectoryTraversalPrivilegeEscalationBufferOverflowCryptojackingSessionHijackingDenial ofService(DoS)DDoSAttackBackdoorCross-SiteScripting(XSS)SocialEngineeringRansomwareDataBreachMalware

Patch แตก!แหก!กระจาย!! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Unpatched Software
  2. Trojan Horse
  3. Phishing
  4. SQL Injection
  5. Weak Passwords
  6. Zero-Day Exploit
  7. Man-in-the-Middle (MITM)
  8. Remote Code Execution (RCE)
  9. Insider Threat
  10. Insecure APIs
  11. Brute Force Attack
  12. Directory Traversal
  13. Privilege Escalation
  14. Buffer Overflow
  15. Cryptojacking
  16. Session Hijacking
  17. Denial of Service (DoS)
  18. DDoS Attack
  19. Backdoor
  20. Cross-Site Scripting (XSS)
  21. Social Engineering
  22. Ransomware
  23. Data Breach
  24. Malware