{"type":"video","version":"1.0","title":"13. Explotación Ataques en Red (DoS, MITM)","author_name":"Curso Hacking Etico 01","author_url":"https://odysee.com/@hackMasterPro:b","provider_name":"Odysee","provider_url":"https://odysee.com","thumbnail_url":"https://thumbnails.odycdn.com/card/s:1280:720/quality:85/plain/https://thumbs.odycdn.com/1bd64da17bc280ed221134d04bc4c21c.webp","thumbnail_width":"390","thumbnail_height":"220","html":"<iframe id=\"odysee-iframe\" style=\"width:100%; aspect-ratio:16 / 9;\" src=\"https://odysee.com/%24/embed/%40hackMasterPro%3Ab%2FExplotaci%C3%B3n-Ataques-en-Red-%28DoS%2C-MITM%29%3A7?autoplay=true\" allowfullscreen></iframe>","width":560,"height":315}