Contents

๐ŸŒ Pachinko

A detailed write-up of the Web challenge 'Pachinko' from PicoCTF - 2025

/images/PicoGym/PicoCTF-2025/Pachinko/challenge_presentation.png
Challenge Presentation

๐Ÿ“Š Challenge Overview

Category Details Additional Info
๐Ÿ† Event PicoGym Event Link
๐Ÿ”ฐ Category Web ๐ŸŒ
๐Ÿ’Ž Points Out of 500 total
โญ Difficulty ๐ŸŸก Medium Personal Rating: ?/10
๐Ÿ‘ค Author notdeghost Profile
๐ŸŽฎ Solves (At the time of flag submission) 1.539 solve rate
๐Ÿ“… Date 20-03-2025 PicoGym
๐Ÿฆพ Solved By mH4ck3r0n3 Team:

๐Ÿ“ Challenge Information

History has failed us, but no matter.

๐ŸŽฏ Challenge Files & Infrastructure

Provided Files

Files:

๐Ÿ” Initial Analysis

First Steps

Initially, the website appears as follows:

/images/PicoGym/PicoCTF-2025/Pachinko/site_presentation.png
Site Presentation

It looks like a web application that simulates a circuit builder for NAND (NOT AND). This is all I have understood since the entire internal logic is literally built within the challenge.

๐ŸŽฏ Solution Path

Exploitation Steps

Exploitation

The exploit is ridiculously simple, so I donโ€™t think this is the proper way to solve itโ€ฆ but by setting up any type of circuit and trying to submit it, after a few attempts, the check is probably bypassed, and the flag is released. I donโ€™t understand how or why, but apparently, it works as an exploitation method.

Flag capture

/images/PicoGym/PicoCTF-2025/Pachinko/manual_flag2.png
Manual Flag
/images/PicoGym/PicoCTF-2025/Pachinko/manual_flag.png
Manual Flag

๐Ÿ› ๏ธ Exploitation Process

Approach

The automatic exploit runs a while True loop until it receives the flag and extracts it from the response using a regex, then prints it.

๐Ÿšฉ Flag Capture

Flag

picoCTF{p4ch1nk0_f146_0n3_e947b9d7}

Proof of Execution

/images/PicoGym/PicoCTF-2025/Pachinko/automated_flag.png
Automated Flag
Screenshot of successful exploitation

๐Ÿ”ง Tools Used

Tool Purpose
Python Exploit

๐Ÿ’ก Key Learnings

Time Optimization

  • I don’t know, maybe trying to persist?

Skills Improved

  • Binary Exploitation
  • Reverse Engineering
  • Web Exploitation
  • Cryptography
  • Forensics
  • OSINT
  • Miscellaneous

๐Ÿ“š References & Resources

Learning Resources


๐Ÿ“Š Final Statistics

Metric Value Notes
Time to Solve 01:30 From start to flag
Global Ranking (At the time of flag submission) Challenge ranking
Points Earned Team contribution

Created: 20-03-2025 โ€ข Last Modified: 20-03-2025 *Author: mH4ck3r0n3 โ€ข Team: *