{"type":"video","version":"1.0","html":"<iframe width=\"560\" height=\"315\" sandbox=\"allow-same-origin allow-scripts allow-popups allow-forms\" title=\"2. Metasploit.mp4\" src=\"https://stream.mastiffsystems.com/videos/embed/9MA54zKzD5JkhArPfzEg5R\" style=\"border: none\" allow=\"fullscreen\"></iframe>","width":560,"height":315,"title":"2. Metasploit.mp4","author_name":"Learn Ethical Hacking Using Kali Linux From A to Z","author_url":"https://stream.mastiffsystems.com/video-channels/hacking01","provider_name":"PeerTube","provider_url":"https://stream.mastiffsystems.com","thumbnail_url":"https://stream.mastiffsystems.com/lazy-static/previews/3bdca243-f2ee-43bd-ab39-ee98125930e7.jpg","thumbnail_width":850,"thumbnail_height":480}