Post

Perceptions | 0xFun CTF 2026

a writeup for "Shell" in 0xFun CTF 2026.

Perceptions | 0xFun CTF 2026

Overview

  • Platform: 0xFun
  • Challenge: Perceptions
  • Categories: Web
  • Rating: 9/10
  • Difficulty: Easy
  • Sovling Time: ~20 Minutes

Challenge

Take a look at the blog I created! It has a neat backend and, interestingly, seems to use fewer ports.

Walkthrough

Recon

The website looks very normal, just we have a login page, later on that later.

Something looks fishy in Secret Post, by viewing the page source we can see some credentials:

Solution Approach

Flag format: 0xfun{}

From recon we can try credentials we found in the login page

Username is Charlie, you can see this at top of the site.

Nothing has changes….. Wait they mentioned in a blog something about many things running on many ports, lets try to SSH into the server with the provided credentials.

1
ssh -p 48385 Charlie@chall.0xfun.org

And it worked!! Lets find the flag.

Flag

0xfun{p3rsp3c71v3.15.k3y}

Hope you enjoined the writeup, Don’t forget to leave a comment or a star on the github repo (;

This post is licensed under CC BY 4.0 by the author.