<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Gyrfalcon arşivleri &#187; Siber Bülten</title>
	<atom:link href="https://siberbulten.com/tag/gyrfalcon/feed/" rel="self" type="application/rss+xml" />
	<link>https://siberbulten.com/tag/gyrfalcon/</link>
	<description>Siber Güvenliğin Türkçe Hafızası</description>
	<lastBuildDate>Wed, 18 Oct 2017 18:24:01 +0000</lastBuildDate>
	<language>tr</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://siberbulten.com/wp-content/uploads/2020/11/cropped-favicon-siberbulten-min-300x300.png</url>
	<title>Gyrfalcon arşivleri &#187; Siber Bülten</title>
	<link>https://siberbulten.com/tag/gyrfalcon/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>CIA&#8217;in SSH&#8217;i aştığı siber gereçler: BothanSpy ve Gyrfalcon</title>
		<link>https://siberbulten.com/vault7/ciain-sshi-astigi-siber-gerecler-bothanspy-ve-gyrfalcon/</link>
					<comments>https://siberbulten.com/vault7/ciain-sshi-astigi-siber-gerecler-bothanspy-ve-gyrfalcon/#respond</comments>
		
		<dc:creator><![CDATA[Ergün Varlık]]></dc:creator>
		<pubDate>Wed, 18 Oct 2017 18:24:01 +0000</pubDate>
				<category><![CDATA[Vault7]]></category>
		<category><![CDATA[BothanSpy]]></category>
		<category><![CDATA[CIA]]></category>
		<category><![CDATA[Gyrfalcon]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Vault 7]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">https://siberbulten.com/?p=5655</guid>

					<description><![CDATA[<p>Wikileaks’in CIA’in çok gizli siber bilgilerini yayınladığı Vault 7 belgelerinin, 7 Temmuz tarihli olanı, CIA’in zararlı yazılımlarla Linux ve Windows işletim sistemli cihazlardan SSH kimlik bilgilerini nasıl çaldığını ortaya koyuyor. SSH bir ağ üzerinden baska bilgisayarlara erişim sağlamak, uzak bir bilgisayarda komutlar çalıştırmak ve bir bilgisayardan diğerine dosya transfer etmek için geliştirilmiş bir protokol. Bu &#8230;</p>
<p>The post <a href="https://siberbulten.com/vault7/ciain-sshi-astigi-siber-gerecler-bothanspy-ve-gyrfalcon/">CIA&#8217;in SSH&#8217;i aştığı siber gereçler: BothanSpy ve Gyrfalcon</a> appeared first on <a href="https://siberbulten.com">Siber Bülten</a>.</p>
]]></description>
		
					<wfw:commentRss>https://siberbulten.com/vault7/ciain-sshi-astigi-siber-gerecler-bothanspy-ve-gyrfalcon/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
