Grant Collins (@collinsinfosec) 's Twitter Profile
Grant Collins

@collinsinfosec

💻 Infrastructure Security Engineer
📽️ YouTube: youtube.com/@collinsinfosec

ID: 921790159649157123

linkhttp://www.cybercademy.org calendar_today21-10-2017 17:27:54

470 Tweet

4,4K Followers

115 Following

Grant Collins (@collinsinfosec) 's Twitter Profile Photo

I never knew you could 'email spoof' with telnet. In this video I conduct an SPF-bypass using telnet commands, this was something you could do easily back in the 2000s, since then, thanks to protocols such as DKIM and DMARC, it's a bit more difficult. youtu.be/CYdihXNzm0g

Grant Collins (@collinsinfosec) 's Twitter Profile Photo

If you pay attention to your surroundings, you will notice QR codes are everywhere. In this video, I investigate the effectiveness of placing malicious QR codes and play around the QRL Jacking to hijack user sessions. youtu.be/5m1v43RvPUg

Grant Collins (@collinsinfosec) 's Twitter Profile Photo

I developed an SSH Honeypot to catch Hackers and Bots. Project HONEYPY, collects usernames, passwords, emulated shell commands. This project was a fun way to get back into writing some code. More information about the development process & deployment: youtu.be/tyKyLhcKgNo

Grant Collins (@collinsinfosec) 's Twitter Profile Photo

Cybersecurity side-projects matter. They help you apply theory into practical implementation while building a portfolio. As I ramp up a threat detections engineering lab, I thought I would share 3 of the main cybersecurity projects I have done in the past. youtu.be/045XS4jlhcw

Grant Collins (@collinsinfosec) 's Twitter Profile Photo

The industry is inundated with data breach notifications every day... with some recent prolific examples occurring, I thought I to overview the breach response when mature companies receive a notification to final closure. youtu.be/dSv8sjB1Uu8

Grant Collins (@collinsinfosec) 's Twitter Profile Photo

There are a lot of cybersecurity job openings. Most of them are senior / principal-level. Why is this? I propose 3 reasons. 1) Hiring Gap Expectations. 2) Security (often) requires experience. 3) Security is a Cost Center. More on my points here 👉 youtu.be/6x3pXqwEELE

There are a lot of cybersecurity job openings. Most of them are senior / principal-level. Why is this? 

I propose 3 reasons.

1) Hiring Gap Expectations.
2) Security (often) requires experience.
3) Security is a Cost Center. 

More on my points here 👉 youtu.be/6x3pXqwEELE
Grant Collins (@collinsinfosec) 's Twitter Profile Photo

Introducing HONEYPY, a fully-fledged, modular-based honeypot written in Python. This application offers various types, including SSH, HTTP, and dashboards to visualize data. The goal is to continue to expand the protocol and host types. 👉 Learn more here: github.com/collinsmc23/ss…

Introducing HONEYPY, a fully-fledged, modular-based honeypot written in Python. This application offers various types, including SSH, HTTP, and dashboards to visualize data. The goal is to continue to expand the protocol and host types. 👉 Learn more here: github.com/collinsmc23/ss…
Grant Collins (@collinsinfosec) 's Twitter Profile Photo

One of many things I've learned in the infosec community, everyone's path is different. However, getting started in security can be overwhelming regardless of which path. I thought I would construct a few tips or :anecdotes" I've learned along the way. youtu.be/5S3JXVgAkeE

Grant Collins (@collinsinfosec) 's Twitter Profile Photo

Build an SSH and HTTP honeypot in python. With my recent adventures in honeypots, I thought I would "share the knowledge" forward with a compiled crash course. Enjoy! 🍯youtu.be/gDjDxS55890

Grant Collins (@collinsinfosec) 's Twitter Profile Photo

I've scoped and started a new, fun project, Threat Detections Engineering 101. Deploying a centralized logging infra to collect and write custom + managed detections based on honeypot networks, I hope to learn more about this space! More here 👉: youtu.be/a6-_TqbCbkY

Grant Collins (@collinsinfosec) 's Twitter Profile Photo

OPSEC. Quite often, the downfall of many prolific hackers to everyday script kiddies. OPSEC is both working for and against you. In this video, I overview what OPSEC is, why it's hard to implement, and a few anecdotes of lessons: youtu.be/pg9wt5S8P2Y