Grant Collins (@collinsinfosec) 's Twitter Profile
Grant Collins

@collinsinfosec

πŸ’» Infrastructure Security Engineer
πŸ“½οΈ YouTube: youtube.com/@collinsinfosec

ID: 921790159649157123

linkhttp://www.cybercademy.org calendar_today21-10-2017 17:27:54

470 Tweet

4,4K Followers

115 Following

Grant Collins (@collinsinfosec) 's Twitter Profile Photo

I never knew you could 'email spoof' with telnet. In this video I conduct an SPF-bypass using telnet commands, this was something you could do easily back in the 2000s, since then, thanks to protocols such as DKIM and DMARC, it's a bit more difficult. youtu.be/CYdihXNzm0g

Grant Collins (@collinsinfosec) 's Twitter Profile Photo

If you pay attention to your surroundings, you will notice QR codes are everywhere. In this video, I investigate the effectiveness of placing malicious QR codes and play around the QRL Jacking to hijack user sessions. youtu.be/5m1v43RvPUg

Grant Collins (@collinsinfosec) 's Twitter Profile Photo

I developed an SSH Honeypot to catch Hackers and Bots. Project HONEYPY, collects usernames, passwords, emulated shell commands. This project was a fun way to get back into writing some code. More information about the development process & deployment: youtu.be/tyKyLhcKgNo

Grant Collins (@collinsinfosec) 's Twitter Profile Photo

Cybersecurity side-projects matter. They help you apply theory into practical implementation while building a portfolio. As I ramp up a threat detections engineering lab, I thought I would share 3 of the main cybersecurity projects I have done in the past. youtu.be/045XS4jlhcw

Grant Collins (@collinsinfosec) 's Twitter Profile Photo

The industry is inundated with data breach notifications every day... with some recent prolific examples occurring, I thought I to overview the breach response when mature companies receive a notification to final closure. youtu.be/dSv8sjB1Uu8

Grant Collins (@collinsinfosec) 's Twitter Profile Photo

There are a lot of cybersecurity job openings. Most of them are senior / principal-level. Why is this? I propose 3 reasons. 1) Hiring Gap Expectations. 2) Security (often) requires experience. 3) Security is a Cost Center. More on my points here πŸ‘‰ youtu.be/6x3pXqwEELE

There are a lot of cybersecurity job openings. Most of them are senior / principal-level. Why is this? 

I propose 3 reasons.

1) Hiring Gap Expectations.
2) Security (often) requires experience.
3) Security is a Cost Center. 

More on my points here πŸ‘‰ youtu.be/6x3pXqwEELE
Grant Collins (@collinsinfosec) 's Twitter Profile Photo

Introducing HONEYPY, a fully-fledged, modular-based honeypot written in Python. This application offers various types, including SSH, HTTP, and dashboards to visualize data. The goal is to continue to expand the protocol and host types. πŸ‘‰ Learn more here: github.com/collinsmc23/ss…

Introducing HONEYPY, a fully-fledged, modular-based honeypot written in Python. This application offers various types, including SSH, HTTP, and dashboards to visualize data. The goal is to continue to expand the protocol and host types. πŸ‘‰ Learn more here: github.com/collinsmc23/ss…
Grant Collins (@collinsinfosec) 's Twitter Profile Photo

One of many things I've learned in the infosec community, everyone's path is different. However, getting started in security can be overwhelming regardless of which path. I thought I would construct a few tips or :anecdotes" I've learned along the way. youtu.be/5S3JXVgAkeE

Grant Collins (@collinsinfosec) 's Twitter Profile Photo

Build an SSH and HTTP honeypot in python. With my recent adventures in honeypots, I thought I would "share the knowledge" forward with a compiled crash course. Enjoy! 🍯youtu.be/gDjDxS55890

Grant Collins (@collinsinfosec) 's Twitter Profile Photo

I've scoped and started a new, fun project, Threat Detections Engineering 101. Deploying a centralized logging infra to collect and write custom + managed detections based on honeypot networks, I hope to learn more about this space! More here πŸ‘‰: youtu.be/a6-_TqbCbkY

Grant Collins (@collinsinfosec) 's Twitter Profile Photo

OPSEC. Quite often, the downfall of many prolific hackers to everyday script kiddies. OPSEC is both working for and against you. In this video, I overview what OPSEC is, why it's hard to implement, and a few anecdotes of lessons: youtu.be/pg9wt5S8P2Y