./rip-hg.pl -v -u http://challenge-dbc16a24dc341259.sandbox.ctfhub.com:10800/.hg/
hj@tux:~/dvcs-ripper/.hg$ grep "flag" ./ -arn
./undo.dirstate:1:{b:�j��>���ӾC��ca��������flag_2931217588.txtn���^c50x.htmln��
^K�*
./dirstate:1:,�zm�|G���R���'��Z3n��!����flag_2931217588.txtn���^c50x.htmln��
^K�*
./last-message.txt:1:add flag
./store/00manifest.i:1:Yf��������H�tw�����m'�Ȉ�*x�-�1�@�>�@)-<�M������x�1<�v�Ǣ�2K){�Z3�s�&ӱfA����?6[�B�
6Ta�(��1$�Ü*YI������-$W8���Z�{<�x��>5=22=flag_2931217588.txtbb7bd6be157894ba679b55c83e4a6fc093daf644
grep '-a'忽略二进制文件 '-r' 递归搜索 'n'显示行号
发现
flag_2931217588.txt
我们尝试去网站上访问,得到flag
标签:2931217588,CTFHUB,hg,c50x,flag,txt,泄露,HG From: https://www.cnblogs.com/ErFu/p/18153695