{"type":"video","version":"1.0","html":"<iframe width=\"560\" height=\"315\" sandbox=\"allow-same-origin allow-scripts allow-popups allow-forms\" title=\"The 3 (or 4) P&#39;s of Post Exploitation - Practical Exploitation [Cyber Security Education]\" src=\"https://stream.echo6.co/videos/embed/5BvaWj39264Bnk21FH4WyX\" style=\"border: none\" allow=\"fullscreen\"></iframe>","width":560,"height":315,"title":"The 3 (or 4) P's of Post Exploitation - Practical Exploitation [Cyber Security Education]","author_name":"(YT)Hak5","author_url":"https://stream.echo6.co/video-channels/hak5","provider_name":"PeerTube","provider_url":"https://stream.echo6.co","thumbnail_url":"https://stream.echo6.co/lazy-static/previews/7a49d801-0d86-4a6d-9e91-9fcf49cce2cd.jpg","thumbnail_width":850,"thumbnail_height":480}