Enemy Attacks: Difference between revisions

From the Super Mario Wiki, the Mario encyclopedia
Jump to navigationJump to search
No edit summary
mNo edit summary
Line 5: Line 5:
Just like the [[Attack Pieces]] the [[Mario Bros.]] use, the enemy attacks have their own practice screen.
Just like the [[Attack Pieces]] the [[Mario Bros.]] use, the enemy attacks have their own practice screen.


To unlock these type of attacks for Bowser to use, the [[player]] must be very liberated. The player finds them in cages all around the [[Mushroom Kingdom]]. There are a total of six attacks possible to get. Out of the six, five of them would be found inside one of the cages. The last one is when you collect all fifteen [[Blitty|Blittie]]s through the vacuum ability. The known enemy attacks are:
To unlock these type of attacks for Bowser to use, the [[player]] must liberate Bowser's loyal, non-brainwashed troops. The player finds them in cages all around the [[Mushroom Kingdom]]. There are a total of six attacks possible to get. Out of the six, five of them would be found inside one of the cages. The last one is when the player collects all fifteen [[Blitty|Blitties]] through the vacuum ability. The known enemy attacks are:


*[[Goomba Storm]]
*[[Goomba Storm]]

Revision as of 21:50, September 22, 2009

It has been requested that this article be rewritten and expanded to include more information.

Bowser using his Goomba Army.

Enemy Attacks are what Bowser's Special Attacks during the events of Mario & Luigi: Bowser's Inside Story.

Just like the Attack Pieces the Mario Bros. use, the enemy attacks have their own practice screen.

To unlock these type of attacks for Bowser to use, the player must liberate Bowser's loyal, non-brainwashed troops. The player finds them in cages all around the Mushroom Kingdom. There are a total of six attacks possible to get. Out of the six, five of them would be found inside one of the cages. The last one is when the player collects all fifteen Blitties through the vacuum ability. The known enemy attacks are: