{"type":"video","version":"1.0","html":"<iframe width=\"560\" height=\"315\" sandbox=\"allow-same-origin allow-scripts allow-popups allow-forms\" title=\"7. Another-SET-Attack 2.mp4\" src=\"https://stream.mastiffsystems.com/videos/embed/s36kCpQU24Eq8MxCLjtWSM\" style=\"border: none\" allow=\"fullscreen\"></iframe>","width":560,"height":315,"title":"7. Another-SET-Attack 2.mp4","author_name":"Learn Ethical Hacking Using Kali Linux From A to Z","author_url":"https://stream.mastiffsystems.com/video-channels/hacking01","provider_name":"PeerTube","provider_url":"https://stream.mastiffsystems.com","thumbnail_url":"https://stream.mastiffsystems.com/lazy-static/previews/cba3977d-cf74-4e5f-9a46-d97343b29b8f.jpg","thumbnail_width":850,"thumbnail_height":480}