{"type":"video","version":"1.0","html":"<iframe width=\"560\" height=\"315\" sandbox=\"allow-same-origin allow-scripts allow-popups allow-forms\" title=\"8. Planning a Penetration Test.mp4\" src=\"https://stream.mastiffsystems.com/videos/embed/eh1NtXGRcUwr8rwVR7WjP2\" style=\"border: none\" allow=\"fullscreen\"></iframe>","width":560,"height":315,"title":"8. Planning a Penetration Test.mp4","author_name":"Ethical Hacking and Penetration Testing Bootcamp with Linux","author_url":"https://stream.mastiffsystems.com/video-channels/hacking02","provider_name":"PeerTube","provider_url":"https://stream.mastiffsystems.com","thumbnail_url":"https://stream.mastiffsystems.com/lazy-static/previews/0687e1cc-3971-48c1-ad1a-6f068f61bf37.jpg","thumbnail_width":850,"thumbnail_height":480}