Monday, April 13, 2020

Hacking Facebook By Using PHP Script | Social Engineering Attack | LAN And WAN (Same Or Different Networks)


This Video is absolutely for Educational Purposes only, please don't do any illegal activity. If you do then I'm not responsible for your illegal activity. The purpose of this video is to show you How hackers can hack your social media by using their own local servers.

Basically these type of attacks  known as Social Engineering attacks or Phishing. Attacker just send the duplicate vulnerable HTML page to the victim, when victim enters any type of information to that vulnerable page it'll automatically received by the attacker.

Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels. The attacker uses phishing emails to distribute malicious links or attachments that can perform a variety of functions, including the extraction of login credentials or account information from victims.

How phishing works 

Phishing attacks typically rely on social networking techniques applied to email or other electronic communication methods, including direct messages sent over social networks, SMS text messages and other instant messaging modes.

Phishers may use social engineering and other public sources of information, including social networks like LinkedIn, Facebook and Twitter, to gather background information about the victim's personal and work history, his interests, and his activities.

Hacking by PHP

As PHP is server side scripting language so first of all you have need to install a local server (WAMP, XAMPP or LAMPP) over your system. Because if there is no any server running on your system then you can't even run your PHP script. So if you wanna do a programming with PHP this is the first step to download and install a server from the Internet. You can easily download and install servers by watching my videos. Just visit my YouTube channel and watch there.



How to use Brutality?

Examples:
   Use default wordlist with 5 threads (-t 5) and hide 404 messages (–e 404) to fuzz the given URL (http://192.168.1.1/FUZZ):
python brutality.py -u 'http://192.168.1.1/FUZZ' -t 5 -e 404

   Use common_pass.txt wordlist (-f ./wordlist/common_pass.txt), remove response with 6969 length (-r 6969) and proxy at 127.0.0.1:8080 (-p http://127.0.0.1:8080) to fuzz the given URL (http://192.168.1.1/brute.php?username=admin&password=FUZZ&submit=submit#):
python brutality.py -u 'http://192.168.1.1/brute.php?username=admin&password=FUZZ&submit=submit#' -f ./wordlist/common_pass.txt -r 6969 -p http://127.0.0.1:8080

ToDo List:
  • Smooth output.
  • Export file report.
  • Modularization.

Related word


  1. Tools Used For Hacking
  2. Hack Tools 2019
  3. Pentest Tools Alternative
  4. Easy Hack Tools
  5. Underground Hacker Sites
  6. What Is Hacking Tools
  7. Hack Tools For Windows
  8. Pentest Tools Url Fuzzer
  9. Hacking Tools And Software
  10. Growth Hacker Tools
  11. Physical Pentest Tools
  12. Hacking Tools Mac
  13. Hack Apps
  14. Pentest Recon Tools
  15. Hack Tool Apk
  16. Tools Used For Hacking
  17. Kik Hack Tools
  18. Android Hack Tools Github
  19. Hack Tool Apk
  20. Wifi Hacker Tools For Windows
  21. Hacking Tools For Games
  22. Easy Hack Tools
  23. Hack Website Online Tool
  24. Hack And Tools
  25. Hacker Tools Apk Download
  26. Hacking Tools Download
  27. Best Hacking Tools 2019
  28. Hacker Tools Windows
  29. Best Pentesting Tools 2018

HACK SNAPCHAT ACCOUNT BY MAC SPOOFING

In the last article, I have discussed a method on how to hack SnapChat account using SpyStealth Premium App. In this article, I am gonna show you an advanced method that how to hack SnapChat account by mac spoofing. It works same as WhatsApp hacking by mac spoofing. It's a bit more complicated than the last method discussed and requires proper attention. It involves the spoofing of the mac address of the target device. Let's move on how to perform the attack.

HOW TO HACK SNAPCHAT ACCOUNT BY MAC SPOOFING?

Note: This method will work if SnapChat is created on a phone number.
Here I will show you complete tutorial step by step of hacking the SnapChat account. Just understand each step carefully.
  1. Find out the victim's phone and note down it's Mac address. To get the mac address in Android devices, go to Settings > About Phone > Status > Wifi Mac address. And here you'll see the mac address. Just write it somewhere. We'll use it in the upcoming steps.
  2. As you get the target's mac address, you have to change your phone's mac address with the target's mac address. Perform the steps mentioned in this article on how to spoof mac address in android phones.
  3. Now install SnapChat on your phone and use victim's number while you're creating an account. It'll send a verification code to victim's phone. Just grab the code and enter it here.
  4. Once you do that, it'll set all and you'll get all chats and messages which victims sends or receives.
This method is really a good one but very difficult for the non-technical users. Only use this method if you're technical skills and have time to perform every step carefully. Otherwise, you can hack SnapChat account using Spying app.

Related word


Hacking Windows: Tricks Para Saltarse AppLocker

AppLocker es una funcionalidad que apareció con Windows 7 (versión Enterprise y Ultimate) y Windows Server 2008 R2 para sustituir a las Políticas de Restricción de Software - conocidas como SRP "Software Restriction Policies" - de las versiones anteriores. Igual que las directivas de restricción de software, AppLocker permite definir las aplicaciones autorizadas para ser ejecutadas por sus usuarios estándar dentro de su dominio instalando sus parámetros mediante directivas de grupo.

Figura 1: Hacking Windows: Tricks para saltarse AppLocker

La utilidad principal de esta funcionalidad es limitar la instalación de malware e impedir la instalación de software no normalizado y, por supuesto, son pieza fundamental de la Seguridad en Windows Server 2016 y de la aplicación de procesos de fortificación para conseguir la Máxima Seguridad en Windows.

Figura 2: Windows Server 2016: Configuración, Adminisración y Seguridad
de Ángel Núñez (Puedes contactar con él en MyPublicInbox)

Con la aparición de AppLocker, el número de cosas que se pueden realizar a la hora de evitar la ejecución de determinado tipo de programas son muchas. Ente la lista se encuentran:
- Definir reglas basadas en atributos de archivo que se mantengan a lo largo de las actualizaciones de la aplicación (nombre del archivo, versión…) , reglas basadas en la ruta y el hash del archivo. 
- Asignar una regla a un grupo de seguridad o a un usuario individual. 
- Crear Excepciones a ciertas reglas. 
- Modo auditoría para implementar la directiva y ver el impacto que tendrá antes de aplicarla. 
- Simplificar la creación y la administración de reglas de AppLocker con PowerShell.
Las tecnologías de control de acceso, como Active Directory Rights Management Services (ADRMS) y las listas de control de acceso (ACL), ayudan a controlar los usuarios a los que se permite el acceso al bien más preciado de las organizaciones: la información que posee. Al crear una lista de aplicaciones y archivos aprobados y permitidos, AppLocker también se ayuda a impedir la ejecución de aplicaciones para determinados usuarios.

Figura 3: Máxima Seguridad en Windows Gold Edition de
Sergio de los Santos (Puedes contactar con él en MyPublicInbox)

Como AppLocker puede controlar archivos .dll, también es útil para controlar quién puede instalar y ejecutar controles ActiveX y es ideal para aquellas organizaciones que actualmente usan la directiva de grupo para administrar sus equipos.

Hacking Windows: Bypass de AppLocker

Antes de empezar con la prueba de concepto es necesario activar el servicio de identidad de aplicación, así una vez que configuremos las reglas en AppLocker pueda aplicar las reglas que añadamos posteriormente. Para ello abrimos una CMD con permisos de administrador y escribimos el siguiente comando:

Figura 4: Activando el servicio de identidad de aplicacion

Una vez nos muestre que ha sido activado con éxito es necesario reiniciar el sistema operativo, para que se apliquen correctamente los cambios de esta activación. Después, ya podemos proceder a abrir las directivas de seguridad local, que se encuentra dentro de Panel de control\Sistema y  ahí dentro de Seguridad\Herramientas administrativas. Una vez abierta se nos mostrará una ventana como está de la imagen siguiente.

Figura 5: AppLocker

Para comenzar a configurar el servicio, debemos pulsar en el botón verde que dice "Configure rule enforcement" para configurar la aplicación de reglas. En el cuadro de configuración vamos a habilitar reglas de ejecutables tal y como se puede ver a continuación.

Figura 6: La primera opción es "Executable Rules"

Ahora procedemos a crear la regla para limitar la ejecución de una determinada aplicación, en nuestro caso vamos a bloquear a nuestra más que conocida, y muy querida, FOCA - Fear the FOCA! Se puede configurar de diferentes maneras, ya sea por la ruta de una carpeta o fichero, editor de software (el que firma el binario) o bien por el hash de archivo.

Figura 7: Configurando regla de ejecutable por ruta

Prueba 1: Saltando la regla de ruta

Nosotros vamos a elegir la ruta del ejecutable, para ver de manera sencilla cómo funciona AppLocker y después verificamos que se ha creado la regla para FOCA.

Figura 8: Reglas de prohibir FOCA por ruta creada

Como somos muy fan del Pentesting con Powershell, también se os enseñamos cómo se pueden visualizar las reglas que hay creadas en el Windows en el que estás trabajando con un pequeño script , tal y como podéis ver en la siguiente imagen.

Figura 9: Script en PowerShell (Haz clic para ver en grande)

Tras ejecutarlo, el resultado que nos arroja dicho script es lo siguiente. Es decir, la misma información pero directamente en nuestra PowerShell.

Figura 10: Reglas creadas en AppLocker

Y ahora sí, para ver si la configuración que hemos hecho funciona, lo que debería suceder cuando  intentamos ejecutar el binario de FOCA es que se nos mostrara el siguiente mensaje, dejándonos claro que no es posible hacer uso de esta aplicación.

Figura 11: AppLocker prohibe la ejecución de ese archivo

Saltar esta primera protección es bastante sencillo y conocido. Al final, como sabemos por la regla que hemos visto cuando hemos ejecutado nuestro script PowerShell, esta aplicación está bloqueada por ruta, es decir, que si tenemos permisos de lectura del binario de la FOCA - o de toda la carpeta - y escritura en una carpeta del sistema, podemos hacer lo siguiente:

Figura 12: Copiamos la carpeta de la FOCA a otra ubicación

Si la fortificación del sistema no se ha hecho acompañándolo de una estricta ACL, podremos copiar la carpeta de Origen (FocaPro_locked) a una nueva ubicación (FocaPro_unlocked), invalidando completamente la regla de AppLocker que está configurada.

Figura 13: Carpetas copiadas. Una afectada por AppLocker y otra no.

Ahora ya, si intentamos ejecutar el nuevo binario de FOCA, no encontraremos ninguna regla en AppLocker que le afecte, así que podemos disfrutar de

Figura 14: FOCA Final

No es nada sorprendente que esto pase de esta forma. Esta regla hace lo que dice, que es evitar que un programa que esté en una ruta concreta no se ejecute y si no lo acompañas de otras medidas de fortificación la regla sirve para lo que sirve. Por eso hay más medidas en AppLocker.

Prueba 2: Saltando la regla de Hash

Ahora que ya entendemos algo mejor AppLocker, vamos a ver otro ejemplo de bypass, pero esta vez vamos a saltarnos la regla del Hash de un fichero, que al igual que la regla anterior tiene sus limitaciones. Trabajaremos en este caso con Process Explorer (procexp64.exe), la herramienta de Sysinternals para ver los procesos en Windows. Primero obtenemos el Hash del fichero :

Figura 15: Obteniendo el Hash de un fichero con PowerShell

Como habéis visto, esto es algo que también podemos hacer con PowerShell. Y una vez que lo tenemos, configuramos una regla como en el caso anterior, pero esta ver seleccionando Hash File e introduciendo el Hash que acabamos de obtener.

Figura 16: Hash File Rule creada

Una vez tenemos la regla creada, AppLocker se encargará de comprobar ese hash en cualquier ejecutable que se intente lanzar, y si coincide con el de la regla, bloqueará el binario y no permitirá su ejecución, tal y como se puede ver en la imagen siguiente.

Figura 17:AppLocker bloquea procexp64.exe

Por supuesto, si llevas años en la industria de la detección de malware, ya sabes que hacer reglas para malware basado en Hashes siempre fue una mala idea, y haciendo un "Morphing de Superman", es decir, cambiando cualquier byte de una cadena de caracteres podemos modificar ese Hash. Para ello basta con que abramos el binario con un editor Hexadecimal y hacer una ligera modificación en una cadena de texto, para que el programa siga siendo totalmente funcional.

Figura 18: Haciendo un "Morphing de Superman"

Los caracteres en rojo, son aquellos que hemos modificado, simplemente hemos sustituido las letras que se visualizaban en la parte derecha por puntos. Guardamos como un nuevo binario llamado "procexp64_unlocked.exe" pero no porque con otro nombre lo vaya a ejecutar, si no para la prueba, podéis renombrarlo con el mismo nombre del binario para comprobar que realmente es efectivo. Una vez terminado el proceso del "Morphing de Superman", comprobamos que el Hash de los dos binarios es diferente :

Figura 19: Ya no tienen el mismo hash

Por supuesto, si ahora ejecutamos el nuevo binario - con diferente Hash - vemos que realmente nos hemos saltado la restricción por Hash de AppLocker porque, evidentemente, esta ya no le aplica para nada al tenerlo cambiado.

Figura 20: Process Explorer se ejecuta

Como os podéis imaginar, conocer en detalle el funcionamiento de estas tecnologías es fundamental para fortificar cualquier entorno Windows en una empresa, y entender cómo funcionan las reglas de ruta y de hash, y cuales son sus limitaciones es importante. Por supuesto, saber qué reglas están configuradas y cómo se puede saltar  AppLocker en un proyecto de auditoría que requiera tirar de técnicas de Hacking Windows es muy útil.

Figura 21: Hacking Windows: Ataques a sistemas y redes Microsoft

Te puedes encontrar AppLocker configurado en una auditoría, y si te encuentras estas reglas en las restricciones ya has visto que no es muy complicado. Sin embargo AppLocker también tiene reglas basadas en los certificados digitales con la que están firmados los ejecutables, donde un administrador concienzudo puede elegir qué fabricantes de software, qué programas y qué versiones concretas son las que se pueden utilizar o las que están prohibidas. Cuando esto es así, encontrar la forma de saltarse la restricción es más complicada. Eso sí, siempre puedes traerte tus propios programas sin firmar cuando haya listas negras...

Saludos!

Autor: Víctor Rodriguez Boyero, Security Researcher en el equipo de Ideas Locas de CDCO de Telefónica.


Related articles
  1. Pentest Tools Tcp Port Scanner
  2. Hak5 Tools
  3. Hack And Tools
  4. Pentest Tools Bluekeep
  5. Top Pentest Tools
  6. Hack Tools Github
  7. Hack Tool Apk
  8. What Are Hacking Tools
  9. Hacker Tools Windows
  10. Pentest Tools Kali Linux
  11. Pentest Tools Open Source
  12. Install Pentest Tools Ubuntu
  13. Game Hacking
  14. Hacker Techniques Tools And Incident Handling
  15. Hacker Search Tools

BurpSuite Introduction & Installation



What is BurpSuite?
Burp Suite is a Java based Web Penetration Testing framework. It has become an industry standard suite of tools used by information security professionals. Burp Suite helps you identify vulnerabilities and verify attack vectors that are affecting web applications. Because of its popularity and breadth as well as depth of features, we have created this useful page as a collection of Burp Suite knowledge and information.

In its simplest form, Burp Suite can be classified as an Interception Proxy. While browsing their target application, a penetration tester can configure their internet browser to route traffic through the Burp Suite proxy server. Burp Suite then acts as a (sort of) Man In The Middle by capturing and analyzing each request to and from the target web application so that they can be analyzed.











Everyone has their favorite security tools, but when it comes to mobile and web applications I've always found myself looking BurpSuite . It always seems to have everything I need and for folks just getting started with web application testing it can be a challenge putting all of the pieces together. I'm just going to go through the installation to paint a good picture of how to get it up quickly.

BurpSuite is freely available with everything you need to get started and when you're ready to cut the leash, the professional version has some handy tools that can make the whole process a little bit easier. I'll also go through how to install FoxyProxy which makes it much easier to change your proxy setup, but we'll get into that a little later.

Requirements and assumptions:

Mozilla Firefox 3.1 or Later Knowledge of Firefox Add-ons and installation The Java Runtime Environment installed

Download BurpSuite from http://portswigger.net/burp/download.htmland make a note of where you save it.

on for Firefox from   https://addons.mozilla.org/en-US/firefox/addon/foxyproxy-standard/


If this is your first time running the JAR file, it may take a minute or two to load, so be patient and wait.


Video for setup and installation.




You need to install compatible version of java , So that you can run BurpSuite.

Related articles


  1. Hacking Tools For Games
  2. Hack Tools Pc
  3. Hack Tools For Ubuntu
  4. Pentest Tools Windows
  5. Computer Hacker
  6. Hacking Tools Kit
  7. Hacking Tools 2019
  8. Underground Hacker Sites
  9. Hacker Tools Software
  10. Install Pentest Tools Ubuntu
  11. Easy Hack Tools
  12. Pentest Tools Website
  13. Best Hacking Tools 2019
  14. Best Pentesting Tools 2018
  15. Install Pentest Tools Ubuntu
  16. Computer Hacker
  17. Nsa Hacker Tools
  18. Hacking Tools For Beginners
  19. Hacking Tools Usb
  20. Pentest Tools Review
  21. Hacker Tools 2019
  22. Hacking Tools 2020
  23. Pentest Tools Website Vulnerability

Saturday, April 11, 2020

Bimonthly Progress Report For My Twitch Channel, FuzzyJCats, Dec 25 Through March 1

Twitch Channel FuzzyJCats

This is a much overdue monthly report! I've also decided to make it easier to remember by writing the report on the first day of the month, so progress will be discussed up through today, March 1.

Also, as I'm only streaming 2 times/week, I've decided to make these bimonthly progress reports as not much change occurs in only 8 streams.

Since Christmas, I have improved in terms of being able to multi-task without any preparation almost as smoothly as when I'm fully prepared, that is being in good health and having exercised before streaming! I recall when I first started streaming, I was flustered and struggled whenever anything goes awry, and my resilience in streaming has improved over the months of practice.

Therefore, I can stream more spontaneously, and as a result, I streamed after work yesterday, when I tend to be completely brain dead, and it wasn't a bad performance!

I felt that by streaming after work and having my days off to do whatever I need or want to do, it will improve my lifestyle. The issue with work is that I dread having to get up and being tied to a schedule as well as paperwork. But if I have streaming to look forward to, it would make me look just a little bit forward to work, rather than having that sinking feeling.

It's more ideal to be able to live in the moment and enjoy the day off before work, but that's easier said than done. Instead, I think about how I have to get up and be rushed to go to work, which gives me a sense of dread. I'm the type of person who likes to do chores and responsibilities in a relaxed manner (again, something that I have to work on).

While getting to the ideal state of being able to live in the moment, and not being so non-plussed about being rushed to a schedule, I think streaming after work can help with not feeling as much dread, since again, it will be something that I look forward to.

I believe I have gotten over my issues with viewer numbers. Tired of having the post-it blocking my viewer numbers on screen, as it blocks the game, I decided to take off the post-it. The fact that I don't even notice the red viewer numbers flashing means that I'm immune to feeling one way or the other by these numbers!

However, there are times when I feel a little demoralized when I see that my Wed viewer counts aren't as high as my Sun numbers, and noticing that my average concurrent viewers over the months haven't really increased, but remained stable at around 10.

Even so, I believe that not caring about the viewer numbers while live shows progress and also helps with gameplay as I can see the more of the game.

The other thing that came up as an improvement is that in the past, I streamed because it forced me to exercise - but now I no longer need to exercise before streaming. Furthermore, before I came down with current bronchitis, there were quite a few days when I exercised when I didn't have to stream! Now that I no longer need streaming to force me to exercise, the only reason for me to stream is if and only if I find it fun!

I believe I was burned out at one point and decided to stop Twitch completely since I got deeply involved in a niche Japanese RPG game, Atelier Sophie. During that time, I was thinking, wouldn't it be nice if I can spend more time playing video games with complete focus and immersion on my days off than having to stream!

However, I then felt guilt that if I stopped streaming altogether, it'll be unfair to my viewers who subscribed to me - they're paying monthly fees to watch me - and I feel that I need to give them their money's worth.

Whenever I have to do something out of duty and responsibility, it tends to be a wet blanket. I don't know what changed and made me find streaming a joy again - perhaps it was taking off a week due to getting chest cold - because streaming the past 2 days in a row was a joy!

In other words, anytime I feel that streaming is a burden and an obligation, that will be a sign to me to take some time off - hopefully I can stream a couple of more times just to give the community a heads up that I'm going to take a break. 

When I was caring about viewer numbers, however, I joined stream teams and found out that they tend to have extreme favoritism, where members who may not support but are friends reap all the viewer numbers. I've noticed quite a few members who support the leaders of these stream teams through buying and gifting subs, bits, and donations, yet had low concurrent viewers. On the flip side, those who are friends (despite not supporting at all) had very large numbers, despite the quality of streams between the two groups being more or less the same.

As a result, I stopped making these stream teams my main team. Fortunately, I'm not going to fall for these stream teams anymore since I'm more or less able to not care about my viewer numbers as evidenced by no longer needing post-it to block these numbers during broadcast.

I still need to work on habits such as making a cluck sound at times when I complete a thought, and again decreasing filler words. Making sure my eyes go back and forth from game to chat has not come naturally by any means. There're still quite a few times when I get so enthralled in the game that I forget to look at chat, or I get too involved in chat, that gameplay comes to a grinding halt.

Progress made:
  • Being able to change my schedule after work to improve quality of life - I can multi-task almost as well even if I'm not in perfect condition thanks to months of streaming practice.
  • Streaming is no longer a "crutch" to force myself to exercise as I no longer need to exercise before streaming, AND I was exercising on days when I wasn't streaming.
  • Therefore, only reasons for streaming are for fun and obligation to paid subscribers.
  • Recognizing if I feel burnout, taking time off is a must!
  • No longer caring about seeing viewer numbers while streaming, no longer needing to block off screen with post-its, so gaming is easier and more pleasant with greater visiblity.
  • Recognizing stream teams to gain followers don't work - no longer buying into stream teams that promise increased viewer numbers, but end up showing extreme favoritism.
Improvements to be made:
  • The usual being able to chat and gameplay at same time (this is not habit yet).
  • Decreasing filler words and vocal "tics".
  • Continuing to not care at all about numbers.

Wednesday, April 8, 2020

Game 117: The Legacy: Realm Of Terror (1993) – Introduction

By Voltgloss

In 1992, Infogrames released Alone in the Dark, which put the player in the role of an unsuspecting investigator who experiences the horrors of the mansion of an eccentric magnate, after said eccentric magnate committed suicide. The player tries to escape from the mansion, the unspeakable lurking fears that haunt it in the dark and from the raving madness that the secrets of the mansion could deliver. It is exciting, deadly and … why do I suddenly have this overwhelming sense of déjà vu?


All the pictures into the mind/There's a flashing in my eyes
(Image still from here)

Yes, it's time for a horror double bill here on The Adventure Gamer. The year after Alone in the Dark saw, not only Infogrames's own Shadow of the Comet, but a competitor's entry placed even more solidly in the "haunted house" genre. Because in 1993, Microprose released The Legacy: Realm of Terror, which puts the player in the role of an unsuspecting inheritor who experiences the horrors of the mansion of an eccentric Massachusetts family, as said family's last surviving heir. The player tries to escape from the mansion, the unspeakable lurking fears that haunt it in the dark and from the raving madness that the secrets of the mansion could deliver. It promises to be exciting, deadly, and … why do I suddenly have this overwhelming sense of déjà vu?


We've just been in this place before

So the setup for Legacy is decidedly familiar. What about the gameplay? What we've got on our hands here, based on the manual and a bit of make-sure-everything-works tinkering, is an Adventure/RPG hybrid: a game where the player controls a single character exploring a "dungeon" (the mansion) in first-person perspective, with tile-based mapping and over fifteen different character statistics, all apparently with gameplay significance down the line. Something in the Elvira and Waxworks vein, then - but leaning even more heavily on the RPG side. Will the game stand on its own as an Adventure? Will it navigate the narrow straits of hybridization successfully, or will both halves combine to make less than a whole? We're about to find out.


Higher on the street

The Legacy: Realm of Terror (also called simply The Legacy outside the United States) was the last game developed by British adventure game developer Magnetic Scrolls, after their acquisition by MicroProse. Between 1985 and 1990, Magnetic Scrolls had previously developed six graphical parser-based text adventures (and one "mini-adventure" offered to those who joined the short-lived "Official Secrets" adventure gaming club): The Pawn, The Guild of Thieves, Jinxter, Corruption, Fish!, Myth, and Wonderland. We've not covered any Magnetic Scrolls games previously on this blog - perhaps some Missed Classics treatment is in order down the line? [Admin note: Well, a reviewer did start Wonderland as our sixth Missed Classic, but he vanished after barely scratching the game. A replay is definitely in order.]  For now though, I'm playing through their first and only foray into mouse-driven, RPG-hybrid adventuring, published in 1993 for PC (and released digitally on GOG in December 2019).


See your body into the moonlight

Loading the game treats us to a cinematic intro where someone (our protagonist? someone else?) drives up to the spooky Winthrop House, accompanied by lightning flashes and tense, fast-paced music. Between the glowers of gargoyles our perspective passes through the front door, into a foyer (that we'll see "for real" soon enough), up stairs and through a door - and promptly face-plants into the floor in a dimly lit hallway, blood filling our vision. An omen of things to come? The fate of the last visitor before us? We may never know! What we do know - as the game next tells us after showing a newspaper about the "Winthrop House heir" (us) being located - is that it's time to select (or create) our character.


The fiction is gonna run it again

Character selection/creation lets you pick one of eight different protagonists, each with different backgrounds, character model design, and statistics. You can also manually adjust statistics for any one of the eight characters to tailor their attributes to your liking. The manual also promises that skills can be improved as we progress through the game, although there doesn't appear to be any dedicated "experience" score or character "level"; rather, the game suggests that repeatedly using a particular skill can increase your proficiency at it, Quest for Glory-style. There are seven primary statistics, three of which have four secondary sub-skills, as detailed in the manual:

1. Knowledge - ability to "perform various operations requiring special training." Sub-skills:
  • Electronics - for opening "electronic locks" and dealing with other "electronic objects"
  • First Aid - for restoring health via first aid kits
  • Meditation - for restoring magic power via "Power Crystals"
  • Mechanics - for opening "mechanical locks" and dealing with other mechanical objects
2. Strength - prowess with hand-held weapons, and boosts Health. Sub-skills:
  • Brawling - bare-handed punching prowess
  • Club - prowess with club-type weapons
  • Force - for forcing open doors
  • Lift - for picking up heavy objects
3. Dexterity - a "value for basic agility." Sub-skills:
  • Blade - prowess with bladed weapons
  • Dodge - ability to avoid ranged weapon attacks
  • Firearms - prowess with firearms
  • Throw - ability to throw objects or weapons
4. Stamina - poison resistance and boosts Health

5. Willpower - prowess with magic and resistance to magical attacks

6. Health - our character's life meter; death at zero "hit points." Derived from Strength and Stamina.

7. Magic - or "magic points"; expended by casting spells.

And now, let's meet our eight potential protagonists. Whom shall we pick? That's up to you! I'll be accepting votes in the comments to this post as to your first, second, and third choice of protagonist; I'll then assign 5 points per first-choice pick, 3 points per second-choice pick, and 1 point per third-choice pick, and then using whichever character gets the most points. Ties will be broken by random roll. I'll accept votes up until 72 hours after this is posted. Here we go!


Brad Norris. Sophomore at NYU, ski team captain and Debating Society member.
Planning a "mondo party." Never claimed to have deep motivations.

Brad is the default choice if you're just clicking through as fast as possible, and perhaps by design he's one of the most well-rounded statistically, with equal Knowledge, Strength, and Dexterity scores. Most of his sub-skills have a few bonus points added (the gold line segments extending to the right of the blue, red, or purple line segments below each sub-skill's name).


Charlotte Kane. CEO of the charmingly-named Golgotha Holdings.
Planning to turn Winthrop House into a luxury hotel and conference center.

Charlotte is one of the four options who comes with a spell already learned. No idea why a CEO knows the secrets of the Crimson Mists of Myamoto, but apparently it's a spell to reduce physical damage taken. Statistically, she's got very low strength, mediocre dexterity, but high knowledge (and particularly good at patching herself up with first aid kits). Lower health than Brad, but higher willpower.


Charles Weiss. Stage magician and self-described astrologer and occultist.
Implicated in the Arlington "sacrifice" scandal. We don't talk about the Arlington "sacrifice" scandal.

Charles eschews protective magic for a good old-fashioned fireball spell, leveraging the arcane power of not one, not two, but three words ending in "-eth." Base statistics are generally low across the board (even his Knowledge score is just equal to Brad's, though he's specialized in Meditation where Brad isn't). Where Charles put his bonus points is into his fire magic; see the length of the gold line segment below the "Flames of Desolation" spell name.


Lucy Weston. Sophomore at UCLA. Orphan who worked her way through school.
Tennis and volleyball player. Thinks her inheritance is "totally rad" and "almost tubular." 

Possibly modeled on horror films' "final girl" trope, Lucy here is just as strong as Brad, has extremely high dexterity and health, and is apparently a crack shot (with the best skill in firearms out of all eight characters). As a tradeoff, her knowledge is at rock bottom.


Henry Jones. Head of the Department of American History at Penn State.
Authority on the Salem witch-trials. No word on whether he has a son named Junior.

What horror game is complete without a university professor character? Henry here brings impressive knowledge to the table, with mediocre dexterity (though he's spry enough to dodge and throw surprisingly well) and lots of points devoted to his "Sight of the Dark Walker" spell. I don't have any information on what spells do beyond the description you see here; I'm guessing this lets you see in the dark and, maybe, helps with discovering secrets. Of course, all those points need a tradeoff somewhere; Henry has the least strength and health of all eight characters.


Jane Olson. Investigative journalist with the New York Daily Post.
Looking to uncover the truth about the Winthrop family's enigmatic disappearance.

Jane is our second well-rounded choice. She has very similar stats to Brad, with equal knowledge, strength, and dexterity scores and with solid health and willpower. Jane's a bit better than Brad with at punching, dodging, forcing doors, and tinkering with electronics/mechanics; while Brad has the edge in first aid and throwing skill.


Robert "Boomer" Kowalski. USMC (retired). Purple Heart and Navy Cross holder.
Veteran of actions in Grenada, Panama, and the Gulf.

Someone has to have the most strength of the bunch, and that someone is Robert. He's best situated of the eight to beat down eldritch abominations with his bare fists, and is also ready to swing a mean blade or shoot a mean gun. Average dexterity and mediocre knowledge (though with combat training in the use of first aid kits). His weak point is very low willpower. What's that going to mean in gameplay? We'll see, but the manual suggests your protagonist can become terrified or go into shock at the horrors they'll face. If willpower determines resistance to such effects, our friend Robert here is well-equipped … to go mad.


Isobel Gowdie. Widow and distant Winthrop family relative.
There's always been one Gowdie resident in the area, dating back to the 17th century.

Isobel, like Charles, is a fire-slinging offensive spellcaster. Mediocre stats across the board in exchange for very high willpower and a pumped-up Flames of Desolation spell. Compared to Charles, she has less knowledge (though is a bit better at first aid) and less prowess with weapons; but she actually is better at magic (in both raw magic and in her Flames spell) and has more stamina and health.

So, there's our cast! Whom shall be our avatar for this spooky adventure? You all tell me. I look forward to your choice!

Note Regarding Spoilers and Companion Assist Points: There's a set of rules regarding spoilers and companion assist points. Please read it here before making any comments that could be considered a spoiler in any way. The short of it is that no CAPs will be given for hints or spoilers given in advance of me requiring one. As this is an introduction post, it's an opportunity for readers to bet 10 CAPs (only if they already have them) that I won't be able to solve a puzzle without putting in an official Request for Assistance: remember to use ROT13 for betting. If you get it right, you will be rewarded with 50 CAPs in return. It's also your chance to predict what the final rating will be for the game. Voters can predict whatever score they want, regardless of whether someone else has already chosen it. All correct (or nearest) votes will go into a draw.