{"type":"video","version":"1.0","html":"<iframe width=\"560\" height=\"315\" sandbox=\"allow-same-origin allow-scripts allow-popups allow-forms\" title=\"5. Exploitation Frameworks.mp4\" src=\"https://stream.mastiffsystems.com/videos/embed/8Hr9377whN497nWKKdL6Cv\" style=\"border: none\" allow=\"fullscreen\"></iframe>","width":560,"height":315,"title":"5. Exploitation Frameworks.mp4","author_name":"Ethical Hacking and Penetration Testing Bootcamp with Linux","author_url":"https://stream.mastiffsystems.com/video-channels/hacking02","provider_name":"PeerTube","provider_url":"https://stream.mastiffsystems.com","thumbnail_url":"https://stream.mastiffsystems.com/lazy-static/previews/959c2b8f-4a7f-420c-a433-44e8afe91b51.jpg","thumbnail_width":850,"thumbnail_height":480}