WeakPasswordsUnpatchedSoftwareDenial ofService(DoS)BufferOverflowSessionHijackingSQLInjectionCryptojackingInsecureAPIsBruteForceAttackZero-DayExploitRansomwareTrojanHorsePrivilegeEscalationRemoteCodeExecution(RCE)SocialEngineeringInsiderThreatMan-in-the-Middle(MITM)BackdoorDirectoryTraversalDataBreachDDoSAttackMalwarePhishingCross-SiteScripting(XSS)WeakPasswordsUnpatchedSoftwareDenial ofService(DoS)BufferOverflowSessionHijackingSQLInjectionCryptojackingInsecureAPIsBruteForceAttackZero-DayExploitRansomwareTrojanHorsePrivilegeEscalationRemoteCodeExecution(RCE)SocialEngineeringInsiderThreatMan-in-the-Middle(MITM)BackdoorDirectoryTraversalDataBreachDDoSAttackMalwarePhishingCross-SiteScripting(XSS)

Patch แตก!แหก!กระจาย!! - Call List

(Print) Use this randomly generated list as your call list when playing the game. There is no need to say the BINGO column name. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
  1. Weak Passwords
  2. Unpatched Software
  3. Denial of Service (DoS)
  4. Buffer Overflow
  5. Session Hijacking
  6. SQL Injection
  7. Cryptojacking
  8. Insecure APIs
  9. Brute Force Attack
  10. Zero-Day Exploit
  11. Ransomware
  12. Trojan Horse
  13. Privilege Escalation
  14. Remote Code Execution (RCE)
  15. Social Engineering
  16. Insider Threat
  17. Man-in-the-Middle (MITM)
  18. Backdoor
  19. Directory Traversal
  20. Data Breach
  21. DDoS Attack
  22. Malware
  23. Phishing
  24. Cross-Site Scripting (XSS)