{"type":"video","version":"1.0","html":"<iframe width=\"560\" height=\"315\" sandbox=\"allow-same-origin allow-scripts allow-popups allow-forms\" title=\"3. Exploit Databases.mp4\" src=\"https://stream.mastiffsystems.com/videos/embed/eJLvbVGiTe7gRDAzuQbDZ5\" style=\"border: none\" allow=\"fullscreen\"></iframe>","width":560,"height":315,"title":"3. Exploit Databases.mp4","author_name":"Ethical Hacking and Penetration Testing Bootcamp with Linux","author_url":"https://stream.mastiffsystems.com/video-channels/hacking02","provider_name":"PeerTube","provider_url":"https://stream.mastiffsystems.com","thumbnail_url":"https://stream.mastiffsystems.com/lazy-static/previews/84f4659a-feb1-4ff7-bab1-3558fa24baf2.jpg","thumbnail_width":850,"thumbnail_height":480}