{"type":"video","version":"1.0","html":"<iframe width=\"560\" height=\"315\" sandbox=\"allow-same-origin allow-scripts allow-popups allow-forms\" title=\"8. Meterpreter for Post-Exploitation.mp4\" src=\"https://stream.mastiffsystems.com/videos/embed/sjsWUjfTjUY9M1hgoUf3hW\" style=\"border: none\" allow=\"fullscreen\"></iframe>","width":560,"height":315,"title":"8. Meterpreter for Post-Exploitation.mp4","author_name":"Ethical Hacking and Penetration Testing Bootcamp with Linux","author_url":"https://stream.mastiffsystems.com/video-channels/hacking02","provider_name":"PeerTube","provider_url":"https://stream.mastiffsystems.com","thumbnail_url":"https://stream.mastiffsystems.com/lazy-static/previews/b15b472d-7ebe-4961-859e-bcb9606d3b56.jpg","thumbnail_width":850,"thumbnail_height":480}