Rating:

When we open the fake xkcd website, we see an image. Downloading this image, it's named secrets.png. The image has a pixelated portion of text, when we run it through a tool called Unredacter https://github.com/BishopFox/unredacter, we get the first part of the flag `pix314te_`

But that's not all. If we examine secrets.png further, we can see that it has the bytes of a TIFF image contained within it. Binwalk output:

```0 0x0 PNG image, 1184 x 1656, 8-bit grayscale, non-interlaced
152 0x98 Zlib compressed data, best compression
155640 0x25FF8 TIFF image data, little-endian offset of first image directory: 1960712
```

Extracting the TIFF image, we see the familiar password hunter2 meme. If we examine the **redacted** parts (asterisks). At the center of each asterisk in the first set of asterisks, there is an edited pixel that looks different from their surrounding. Turning the RGB values of these pixels into ASCII characters give us the second part of the flag `asterisk_redacted_password2`

The full flag is `texsaw{pix314te_asterisk_redacted_password2}`