{"pages":{"search":{"query":"Linux Academy","originalQuery":"Linux Academy","serpid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","parentReqid":"","serpItems":[{"id":"15973141694887446067-0-0","type":"videoSnippet","props":{"videoId":"15973141694887446067"},"curPage":0},{"id":"10445789023534140390-0-1","type":"videoSnippet","props":{"videoId":"10445789023534140390"},"curPage":0},{"id":"14865280675538328129-0-2","type":"videoSnippet","props":{"videoId":"14865280675538328129"},"curPage":0},{"id":"11706762062859956463-0-3","type":"videoSnippet","props":{"videoId":"11706762062859956463"},"curPage":0},{"id":"R-I-113683-5-0-4","type":"direct","props":{"isPornoQuery":false,"query":"Linux Academy","text":"Linux Academy","expFlags":{"video_direct_config_desktop_search":"search-grid-row:R-I-48058-718:R-I-474674-109,search-grid-head:R-I-2120168-7","video_direct_render_in_viewport":1,"video_direct_viewport_margin_desktop":700},"pageType":"search","directConfig":{"search":{"id":"R-I-48058-715","pornoId":"R-I-474674-108"},"search-grid-row":{"id":"R-I-48058-718","pornoId":"R-I-474674-109"},"search-grid-head":{"id":"R-I-2120168-7"}},"reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","yandexuid":"3259059651725852523","uuid":null,"platform":"desktop","placement":"search","position":4,"nonce":"0872457290259059657322","fastRender":false,"originalDirectId":"R-I-113683-5","shouldUseContentVisibility":false},"curPage":0},{"id":"13588841270886561389-0-5","type":"videoSnippet","props":{"videoId":"13588841270886561389"},"curPage":0},{"id":"15474213565329913965-0-6","type":"videoSnippet","props":{"videoId":"15474213565329913965"},"curPage":0},{"id":"17646817791513898132-0-7","type":"videoSnippet","props":{"videoId":"7677755737145296716"},"curPage":0},{"id":"675832350034190167-0-8","type":"videoSnippet","props":{"videoId":"5466599671689468807"},"curPage":0},{"id":"9782130221093995089-0-9","type":"videoSnippet","props":{"videoId":"9782130221093995089"},"curPage":0},{"id":"16909835499892697883-0-10","type":"videoSnippet","props":{"videoId":"16909835499892697883"},"curPage":0},{"id":"R-I-113683-5-0-11","type":"direct","props":{"isPornoQuery":false,"query":"Linux Academy","text":"Linux Academy","expFlags":{"video_direct_config_desktop_search":"search-grid-row:R-I-48058-718:R-I-474674-109,search-grid-head:R-I-2120168-7","video_direct_render_in_viewport":1,"video_direct_viewport_margin_desktop":700},"pageType":"search","directConfig":{"search":{"id":"R-I-48058-715","pornoId":"R-I-474674-108"},"search-grid-row":{"id":"R-I-48058-718","pornoId":"R-I-474674-109"},"search-grid-head":{"id":"R-I-2120168-7"}},"reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","yandexuid":"3259059651725852523","uuid":null,"platform":"desktop","placement":"search","position":11,"nonce":"0872457290259059657322","fastRender":false,"originalDirectId":"R-I-113683-5","shouldUseContentVisibility":false},"curPage":0},{"id":"433682869455237169-0-12","type":"videoSnippet","props":{"videoId":"433682869455237169"},"curPage":0},{"id":"9920158304544978019-0-13","type":"videoSnippet","props":{"videoId":"9920158304544978019"},"curPage":0},{"id":"17641075555900545918-0-14","type":"videoSnippet","props":{"videoId":"17641075555900545918"},"curPage":0},{"id":"11715013640820955491-0-15","type":"videoSnippet","props":{"videoId":"11715013640820955491"},"curPage":0},{"id":"261525992364842642-0-16","type":"videoSnippet","props":{"videoId":"261525992364842642"},"curPage":0},{"id":"2729546201994991905-0-17","type":"videoSnippet","props":{"videoId":"2729546201994991905"},"curPage":0},{"id":"9050553717903599692-0-18","type":"videoSnippet","props":{"videoId":"9050553717903599692"},"curPage":0},{"id":"13099425756234424865-0-19","type":"videoSnippet","props":{"videoId":"13099425756234424865"},"curPage":0}],"filters":{},"serpFooter":{"linksGroups":[{"type":"geo","links":[{"label":"Columbus","title":"Columbus","url":"//yandex.com.tr/tune/geo/","logNode":{"name":"region"},"target":"_self","a11yLabel":"Bölgeniz Columbus","needRetpath":true}]},{"type":"help","links":[{"label":"Bize ulaşın","url":"https://yandex.com.tr/support/video/troubleshooting.html","logNode":{"name":"feedback"},"needRetpath":true},{"label":"Yardım","url":"https://yandex.com.tr/support/video/","logNode":{"name":"help"},"needRetpath":true}]},{"type":"settings","links":[{"label":"Ayarlar","url":"https://yandex.com.tr/tune/search/","target":"_self","logNode":{"name":"settings"},"needRetpath":true}]},{"type":"company","links":[{"label":"Şirket hakkında","url":"//yandex.com.tr/company/","logNode":{"name":"about"},"target":"_blank"},{"label":"Kullanım lisansı","url":"//yandex.com.tr/legal/termsofuse/","logNode":{"name":"license"},"target":"_blank"},{"label":"Gizlilik Politikası","url":"//yandex.com.tr/legal/confidential/","logNode":{"name":"confidential"},"target":"_blank"}],"a11yHidden":true}],"hasExtralinks":true},"currentPage":0,"prevPageToLoad":-1,"nextPageToLoad":1,"isTranslationsFilterEnabled":false,"isTranslationsDistributionEnabled":false,"isTranslationsDistributionOnboardingEnabled":false,"isFeedbackModalVisible":false,"viewerData":{"ctx":{"retpath":"https://twitter.yandex.com.tr/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","isAdsDisabled":false,"query":"Linux Academy","reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","signedReqid":"dec5888b10bf453e0ba462fd85c934bd","videoServiceUrl":"https://twitter.yandex.com.tr/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","numdocs":44,"videoSearchUrl":"https://twitter.yandex.com.tr/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","isPornoQuery":false,"quasarData":{"type":"QuasarAuth","retpath":"https://twitter.yandex.com.tr/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","counters":{"popupShow":{"path":"auth.show.quasar"},"popupClose":{"path":"auth.close.quasar"},"loginShow":{"path":"auth.login.show.quasar"},"loginClick":{"path":"auth.login.click.quasar"},"registrationShow":{"path":"auth.registration.show.quasar"},"registrationClick":{"path":"auth.registration.click.quasar"}}},"cookie":{"yp":"undefined"},"reportFeedbackBaseProps":{"initEmail":"","metaFields":{"userAgent":"Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebot@anthropic.com)","userTestids":"191768,223386,238743,246500,257621,253288,265553,270072,277807,274239,294077,278842,299121,313103,331010,338398,378416,359879,415420,644350,652605,645301,679708,689693,690449,696466,696473,722746,740796,769020,776165,777765,771230,781521,790415,801982,851450,878348,886706,883477,900639,931367,937268,969063,935488,945314,989988,982463,991363,990185,1015567,1011895,1035320,1033956,1035241,1036046,1068593,1087297,1089355,1060131,1076329,1099741,1103590,1092869,82358,1089854,1091888,1105522,1106104,66185,260563,88928,263461,30278,1104589,124080","yandexuid":"3259059651725852523","uid":"0","queryText":"Linux Academy","reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL"}}},"organicSnippets":{"0":[{"clear_description":"All the modules included in the Exploit Database are also included in the Metasploit framework and are used by our penetration test tool.. More than 3,000 modules are available with relevant...","description":"All the modules included in the Exploit Database are also included in the Metasploit framework and are used by our penetration test tool.. More than 3,000 modules are available with relevant...","videoWidth":640,"videoHeight":360,"isPorno":false,"online":false,"preview":{"url":"https://video-preview.s3.yandex.net/XcpRGwAAAAA.mp4","type":"video/mp4"},"extra":{"related":{"text":"how to find exploits using exploit database in kali linux Linux academy","related_orig_text":"Linux Academy","related_porno":false,"related_less_3m_off":true,"client":"d2d","no_cnt":1,"related_src":"serp","related":"{\"porno\":false,\"vfp\":1,\"orig_text\":\"Linux Academy\",\"url\":\"http:\\/\\/www.youtube.com\\/watch?v=fMXBX0qnklo\",\"src\":\"serp\",\"rvb\":\"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-AgAD9fsJBgn8Ah_7BvX1AwMA4wH3_wn8AgD9_P39BwAAAAL9-AIJAAAA9_j3BAL_AAD__wf5BAAAABcE_P0DAAAA_QH_A_4BAAD2-gb5AgAAAAAFCP7_AAAAAwYCBwAAAAAJ-u_1AQAAAPb9_gAAAAAAIAAtxonYOzgTQAlITlACKnMQABpgHwQAKgQAuQQWXdMj3e_29-a07fLIO_8RzwDc4QsC8drUsP8w_xz4FwugAAAALi-cGg0ACn_s5LEACKvB2dPkKSFXHxYo3jj30erWS_IMssjpIRcmADfVwstS38__XOAAIAAt3NEUOzgTQAlIb1ACKlMQARpABQ7_qSEQHvYEAgPvEPQoyBXPA_rzCwD1AhoAzyjx-__49yMEIhUgDu8RCyf6HvccBPvV6CEo8BYA-oEGJQnf_SAALbH5hTs4E0APSHFQAjAJOAFKAFIJCA8QkgIYADABYABoAA,,\"}","related_url":"http://www.youtube.com/watch?v=fMXBX0qnklo","parent-reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","related_vfp":1,"relatedVideo":"yes"}},"isPartner":false,"isOld":true,"docid":"33-5-1-ZC613FBEE55E2DDCA","isVertical":false,"hasTranscription":false,"reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","dups":[{"nonStopSupported":true,"filmId":"15973141694887446067","duration":356,"origin":"http://www.youtube.com/watch?v=fMXBX0qnklo","title":{"url":"https://twitter.yandex.com.tr/video/preview/15973141694887446067?how=tm&text=Linux%2BAcademy","text":"how to find exploits using exploit database in kali \u0007[linux\u0007] \u0007[Linux\u0007] \u0007[academy\u0007]"},"clear_title":"how to find exploits using exploit database in kali linux Linux academy","green":{"url":"http://www.youtube.com/watch?v=fMXBX0qnklo","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x1a4c1be3f46/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2FfMXBX0qnklo%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/fMXBX0qnklo?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=fMXBX0qnklo","detailUrl":"https://twitter.yandex.com.tr/video/preview/15973141694887446067?how=tm&text=Linux%2BAcademy","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=fMXBX0qnklo","providerName":"YouTube","url":"http://www.youtube.com/watch?v=fMXBX0qnklo","thumb":{"online":false,"duration":"5:56","image":"//avatars.mds.yandex.net/get-vthumb/3632549/c71cbb630d5a229133dfde260f232b1b/564x318_1"},"views":4364,"time":"2018-02-28T00:00:00.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ==","name":"Linux Academy","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","verified":false,"interactive":true}}],"isTitleTranslated":false,"shouldUseMediaInstreamConfig":false,"contentTypeId":null,"nonStopSupported":true,"filmId":"15973141694887446067","duration":356,"origin":"http://www.youtube.com/watch?v=fMXBX0qnklo","title":{"url":"https://twitter.yandex.com.tr/video/preview/15973141694887446067?how=tm&text=Linux%2BAcademy","text":"how to find exploits using exploit database in kali \u0007[linux\u0007] \u0007[Linux\u0007] \u0007[academy\u0007]"},"clear_title":"how to find exploits using exploit database in kali linux Linux academy","green":{"url":"http://www.youtube.com/watch?v=fMXBX0qnklo","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x1a4c1be3f46/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2FfMXBX0qnklo%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/fMXBX0qnklo?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=fMXBX0qnklo","detailUrl":"https://twitter.yandex.com.tr/video/preview/15973141694887446067?how=tm&text=Linux%2BAcademy","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=fMXBX0qnklo","providerName":"YouTube","url":"http://www.youtube.com/watch?v=fMXBX0qnklo","thumb":{"online":false,"duration":"5:56","image":"//avatars.mds.yandex.net/get-vthumb/3632549/c71cbb630d5a229133dfde260f232b1b/564x318_1"},"views":4364,"time":"2018-02-28T00:00:00.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ==","name":"Linux Academy","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","verified":false,"interactive":true}},{"clear_description":"attract too much attention (for example, if you want to use a sniper rifle, not a machine gun). You are a vulnerability manager and want to validate only a vulnerability to see if you need to...","description":"attract too much attention (for example, if you want to use a sniper rifle, not a machine gun). You are a vulnerability manager and want to validate only a vulnerability to see if you need to...","videoWidth":640,"videoHeight":360,"isPorno":false,"online":false,"preview":{"url":"https://video-preview.s3.yandex.net/h4r0nQAAAAA.mp4","type":"video/mp4"},"extra":{"related":{"text":"How to Exploit A Single Vulnerability with Metasploit Pro - Linux Academy","related_orig_text":"Linux Academy","related_porno":false,"related_less_3m_off":true,"client":"d2d","no_cnt":1,"related_src":"serp","related":"{\"porno\":false,\"vfp\":1,\"orig_text\":\"Linux Academy\",\"url\":\"http:\\/\\/www.youtube.com\\/watch?v=S_Rc7NMNag8\",\"src\":\"serp\",\"rvb\":\"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-AwD8-QYHAgf8AhP9_QD2AQEA6QH4-_n-AQD-8_H8BAAAAP4H9Af8AAAA8QD5CQEAAAAEEgT-6AD_ABL5Av_3AAAAAAf9AP8BAAD1_gMEAwAAAAkKDQkAAAAABwP6BwAAAAAQCP_yAQAAAAX9AvkAAAAAIAAtnXXbOzgTQAlITlACKnMQABpgIAgAJ97_u_EdW9862_z3B_n98PTYYf8ZuP_yJgHx7ezeyCI6_x7wGQegAAAAGQ-lKfsAHn_41dzz4sgYusLzMAgqCeQT2Tbk4ubMYPcXr9LtPx0bACzcygRD5OT6Y-vtIAAtASsdOzgTQAlIb1ACKlMQARpA9wXzqAsKMfIEBwrsEP0dyhPWB_vzCP74BBgDzyf1-vz28CcLLxUqE-oQAyD4__cZBe3T8CUh5hL0CYENGwbg_SAALVSxhjs4E0APSHFQAjAJOAFKAFIJCA8QkgIYADABYABoAA,,\"}","related_url":"http://www.youtube.com/watch?v=S_Rc7NMNag8","parent-reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","related_vfp":1,"relatedVideo":"yes"}},"isPartner":false,"isOld":true,"docid":"33-11-0-Z49933130E2A8E9A1","isVertical":false,"hasTranscription":false,"reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","dups":[{"nonStopSupported":true,"filmId":"10445789023534140390","duration":320,"origin":"http://www.youtube.com/watch?v=S_Rc7NMNag8","title":{"url":"https://twitter.yandex.com.tr/video/preview/10445789023534140390?how=tm&text=Linux%2BAcademy","text":"How to Exploit A Single Vulnerability with Metasploit Pro - \u0007[Linux\u0007] \u0007[Academy\u0007]"},"clear_title":"How to Exploit A Single Vulnerability with Metasploit Pro - Linux Academy","green":{"url":"http://www.youtube.com/watch?v=S_Rc7NMNag8","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x1a4c1be3f46/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2FS_Rc7NMNag8%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/S_Rc7NMNag8?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=S_Rc7NMNag8","detailUrl":"https://twitter.yandex.com.tr/video/preview/10445789023534140390?how=tm&text=Linux%2BAcademy","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=S_Rc7NMNag8","providerName":"YouTube","url":"http://www.youtube.com/watch?v=S_Rc7NMNag8","thumb":{"online":false,"duration":"5:20","image":"//avatars.mds.yandex.net/get-vthumb/2837109/875453c8796fbe408631c6f3a44ef223/564x318_1"},"views":7435,"time":"2018-02-26T22:00:03.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ==","name":"Linux Academy","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","verified":false,"interactive":true}}],"isTitleTranslated":false,"shouldUseMediaInstreamConfig":false,"contentTypeId":null,"nonStopSupported":true,"filmId":"10445789023534140390","duration":320,"origin":"http://www.youtube.com/watch?v=S_Rc7NMNag8","title":{"url":"https://twitter.yandex.com.tr/video/preview/10445789023534140390?how=tm&text=Linux%2BAcademy","text":"How to Exploit A Single Vulnerability with Metasploit Pro - \u0007[Linux\u0007] \u0007[Academy\u0007]"},"clear_title":"How to Exploit A Single Vulnerability with Metasploit Pro - Linux Academy","green":{"url":"http://www.youtube.com/watch?v=S_Rc7NMNag8","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x1a4c1be3f46/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2FS_Rc7NMNag8%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/S_Rc7NMNag8?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=S_Rc7NMNag8","detailUrl":"https://twitter.yandex.com.tr/video/preview/10445789023534140390?how=tm&text=Linux%2BAcademy","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=S_Rc7NMNag8","providerName":"YouTube","url":"http://www.youtube.com/watch?v=S_Rc7NMNag8","thumb":{"online":false,"duration":"5:20","image":"//avatars.mds.yandex.net/get-vthumb/2837109/875453c8796fbe408631c6f3a44ef223/564x318_1"},"views":7435,"time":"2018-02-26T22:00:03.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ==","name":"Linux Academy","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","verified":false,"interactive":true}},{"clear_description":"Metasploit is a penetration testing platform that allows you to find, exploit and validate vulnerabilities. It provides the infrastructure, content and tools for comprehensive penetration testing...","description":"Metasploit is a penetration testing platform that allows you to find, exploit and validate vulnerabilities. It provides the infrastructure, content and tools for comprehensive penetration testing...","videoWidth":854,"videoHeight":480,"isPorno":false,"online":false,"preview":{"url":"https://video-preview.s3.yandex.net/8c0PYgAAAAA.mp4","type":"video/mp4"},"extra":{"related":{"text":"How to Find Vulnerability with Metasploit - Linux Academy","related_orig_text":"Linux Academy","related_porno":false,"related_less_3m_off":true,"client":"d2d","no_cnt":1,"related_src":"serp","related":"{\"porno\":false,\"vfp\":1,\"orig_text\":\"Linux Academy\",\"url\":\"http:\\/\\/www.youtube.com\\/watch?v=X0vlSYhfU-I\",\"src\":\"serp\",\"rvb\":\"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-AAAB_wD-AfkH-Af9AhYC_PL1AgIA4A71BAP8AgD-8_D8BAAAAAD7-Av-AAAA_QHyCAL-AADwEQYD6wD_ABEA8vb8AAAABwH9_v8BAADuDAIDAwAAAAkKDQkAAAAAAgL3EP8AAAAIB_bvAQAAAPz4BvYAAAAAIAAt9JjQOzgTQAlITlACKnMQABpgDfgAHe74n8kYWNEy0_P_CvL66QHjR_8DwP_wCf_sBMrktRs9_xjpGAihAAAALCObNg4A9n_92d4E7vP8pOXlMw5QGO8C3B8Duuy5S_kRtdD2Qz0jAC_Ux-BV5NETZPYbIAAtDfwVOzgTQAlIb1ACKlMQARpA_gz9sgkVJ_0EAgnsBf4gzCLcCffzBv_9BxcD1SP4-_j5AhYEJQciINoL_gYFDPQXAvvm8iEW-xL9_YEHGgnj-CAALZQPlDs4E0APSHFQAjAJOAFKAGAAaAA,\"}","related_url":"http://www.youtube.com/watch?v=X0vlSYhfU-I","parent-reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","related_vfp":1,"relatedVideo":"yes"}},"isPartner":false,"isOld":true,"docid":"33-7-3-Z59BE9A4A96AE9834","isVertical":false,"hasTranscription":false,"reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","dups":[{"nonStopSupported":true,"filmId":"14865280675538328129","duration":312,"origin":"http://www.youtube.com/watch?v=X0vlSYhfU-I","title":{"url":"https://twitter.yandex.com.tr/video/preview/14865280675538328129?how=tm&text=Linux%2BAcademy","text":"How to Find Vulnerability with Metasploit - \u0007[Linux\u0007] \u0007[Academy\u0007]"},"clear_title":"How to Find Vulnerability with Metasploit - Linux Academy","green":{"url":"http://www.youtube.com/watch?v=X0vlSYhfU-I","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x1a4c1be3f46/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2FX0vlSYhfU-I%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/X0vlSYhfU-I?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=X0vlSYhfU-I","detailUrl":"https://twitter.yandex.com.tr/video/preview/14865280675538328129?how=tm&text=Linux%2BAcademy","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=X0vlSYhfU-I","providerName":"YouTube","url":"http://www.youtube.com/watch?v=X0vlSYhfU-I","thumb":{"online":false,"duration":"5:12","image":"//avatars.mds.yandex.net/get-vthumb/3324888/5038d61477bc9cf646685a16dec84e67/564x318_1"},"views":7149,"time":"2018-02-23T22:00:02.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ==","name":"Linux Academy","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","verified":false,"interactive":true}}],"isTitleTranslated":false,"shouldUseMediaInstreamConfig":false,"contentTypeId":null,"nonStopSupported":true,"filmId":"14865280675538328129","duration":312,"origin":"http://www.youtube.com/watch?v=X0vlSYhfU-I","title":{"url":"https://twitter.yandex.com.tr/video/preview/14865280675538328129?how=tm&text=Linux%2BAcademy","text":"How to Find Vulnerability with Metasploit - \u0007[Linux\u0007] \u0007[Academy\u0007]"},"clear_title":"How to Find Vulnerability with Metasploit - Linux Academy","green":{"url":"http://www.youtube.com/watch?v=X0vlSYhfU-I","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x1a4c1be3f46/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2FX0vlSYhfU-I%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/X0vlSYhfU-I?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=X0vlSYhfU-I","detailUrl":"https://twitter.yandex.com.tr/video/preview/14865280675538328129?how=tm&text=Linux%2BAcademy","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=X0vlSYhfU-I","providerName":"YouTube","url":"http://www.youtube.com/watch?v=X0vlSYhfU-I","thumb":{"online":false,"duration":"5:12","image":"//avatars.mds.yandex.net/get-vthumb/3324888/5038d61477bc9cf646685a16dec84e67/564x318_1"},"views":7149,"time":"2018-02-23T22:00:02.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ==","name":"Linux Academy","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","verified":false,"interactive":true}},{"clear_description":"When used correctly, it is a great asset to a ballpoint tester, but it does have its drawbacks.. Vulnerability scanning is well known for a high rate of false positives and false negatives.","description":"When used correctly, it is a great asset to a ballpoint tester, but it does have its drawbacks.. Vulnerability scanning is well known for a high rate of false positives and false negatives.","videoWidth":854,"videoHeight":480,"isPorno":false,"online":false,"preview":{"url":"https://video-preview.s3.yandex.net/EAMgFQAAAAA.mp4","type":"video/mp4"},"extra":{"related":{"text":"How to scan target systems for vulnerability with metasploit in kali linux Linux academy","related_orig_text":"Linux Academy","related_porno":false,"related_less_3m_off":true,"client":"d2d","no_cnt":1,"related_src":"serp","related":"{\"porno\":false,\"vfp\":1,\"orig_text\":\"Linux Academy\",\"url\":\"http:\\/\\/www.youtube.com\\/watch?v=cDt-L2-13Ec\",\"src\":\"serp\",\"rvb\":\"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_AAD9PoJBwn7Aib3AgDzBAQA6xD9_fr_AQD-8u_8BAAAAAL99wIKAAAA-v3-B_3-AAD8BwIA7gD_ACD98vr8AAAA_QH-A_4BAAD1__MCA_8AAAAHEAUAAAAACAP6CAAAAAAN-_3wAQAAAP_1Af4AAAAAIAAtASDIOzgTQAlITlACKnMQABpgC_sAMecFqMQmXMgn3fYSAvvh6w_YRf8Wtf_YBQ4Y-cnVtgI3_xH-B_uhAAAAJQ2mIxUAC3_81_Dz8PDcod31UPJMHe4K-j8JyQDcXRUNt8vdUDgcAC3L5OlL4uQjUf4uIAAtgWcWOzgTQAlIb1ACKlMQARpABhEBqA0IIfADCQHvDPkmxhrPCfvzCgD5ARkA0Sfz_P_x8i0BLhQpGeUKBxD-EPYS-PfT7CIV-hQDAIEHIgng-SAALcrLhzs4E0APSHFQAjAJOAFKAGAAaAA,\"}","related_url":"http://www.youtube.com/watch?v=cDt-L2-13Ec","parent-reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","related_vfp":1,"relatedVideo":"yes"}},"isPartner":false,"isOld":true,"docid":"33-2-3-ZA7238E18C39F0807","isVertical":false,"hasTranscription":false,"reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","dups":[{"nonStopSupported":true,"filmId":"11706762062859956463","duration":219,"origin":"http://www.youtube.com/watch?v=cDt-L2-13Ec","title":{"url":"https://twitter.yandex.com.tr/video/preview/11706762062859956463?how=tm&text=Linux%2BAcademy","text":"How to scan target systems for vulnerability with metasploit in kali \u0007[linux\u0007] \u0007[Linux\u0007] \u0007[academy\u0007]"},"clear_title":"How to scan target systems for vulnerability with metasploit in kali linux Linux academy","green":{"url":"http://www.youtube.com/watch?v=cDt-L2-13Ec","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x1a4c1be3f46/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2FcDt-L2-13Ec%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/cDt-L2-13Ec?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=cDt-L2-13Ec","detailUrl":"https://twitter.yandex.com.tr/video/preview/11706762062859956463?how=tm&text=Linux%2BAcademy","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=cDt-L2-13Ec","providerName":"YouTube","url":"http://www.youtube.com/watch?v=cDt-L2-13Ec","thumb":{"online":false,"duration":"3:39","image":"//avatars.mds.yandex.net/get-vthumb/906125/1e8c020313caa1cd0887c694e9312290/564x318_1"},"views":11342,"time":"2018-02-21T00:00:00.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ==","name":"Linux Academy","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","verified":false,"interactive":true}}],"isTitleTranslated":false,"shouldUseMediaInstreamConfig":false,"contentTypeId":null,"nonStopSupported":true,"filmId":"11706762062859956463","duration":219,"origin":"http://www.youtube.com/watch?v=cDt-L2-13Ec","title":{"url":"https://twitter.yandex.com.tr/video/preview/11706762062859956463?how=tm&text=Linux%2BAcademy","text":"How to scan target systems for vulnerability with metasploit in kali \u0007[linux\u0007] \u0007[Linux\u0007] \u0007[academy\u0007]"},"clear_title":"How to scan target systems for vulnerability with metasploit in kali linux Linux academy","green":{"url":"http://www.youtube.com/watch?v=cDt-L2-13Ec","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x1a4c1be3f46/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2FcDt-L2-13Ec%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/cDt-L2-13Ec?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=cDt-L2-13Ec","detailUrl":"https://twitter.yandex.com.tr/video/preview/11706762062859956463?how=tm&text=Linux%2BAcademy","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=cDt-L2-13Ec","providerName":"YouTube","url":"http://www.youtube.com/watch?v=cDt-L2-13Ec","thumb":{"online":false,"duration":"3:39","image":"//avatars.mds.yandex.net/get-vthumb/906125/1e8c020313caa1cd0887c694e9312290/564x318_1"},"views":11342,"time":"2018-02-21T00:00:00.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ==","name":"Linux Academy","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","verified":false,"interactive":true}},{"type":"video_direct","groudId":"4","directId":"R-I-113683-5","isFake":true},{"clear_description":"The standard Metasploit installer uses a graphical interface to guide it through the installation process. After defining your installation preferences, the installer installs the dependencies...","description":"The standard Metasploit installer uses a graphical interface to guide it through the installation process. After defining your installation preferences, the installer installs the dependencies...","videoWidth":640,"videoHeight":360,"isPorno":false,"online":false,"preview":{"url":"https://video-preview.s3.yandex.net/RO7PNAAAAAA.mp4","type":"video/mp4"},"extra":{"related":{"text":"How to install Metasploit Rapid7 Pro in kali linux Linux academy","related_orig_text":"Linux Academy","related_porno":false,"related_less_3m_off":true,"client":"d2d","no_cnt":1,"related_src":"serp","related":"{\"porno\":false,\"vfp\":1,\"orig_text\":\"Linux Academy\",\"url\":\"http:\\/\\/www.youtube.com\\/watch?v=qefv6LRGFQ4\",\"src\":\"serp\",\"rvb\":\"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_7-AgAK9wQN-gz7Ax_7BvX1AwMA6Pr8_gT-AQAB6_n6_wAAAP0C-wYBAAAA9_j3BAL_AAD7AgsCBAAAAB798_r8AAAA_QL2BP4BAAD1_gMEAwAAAP4BEfr_AAAACAP6BwAAAAAJ-u_1AQAAAPz9A_wAAAAAIAAtaFfWOzgTQAlITlACKnMQABpgDxAAJfgg2NItM-Ii-_n94u3qz_P2G_8h1gDbEhQMD83V7wAsAAv0Agm1AAAACyKLCzcAC17uErIHEcX4y-QCLw1__QEFAkAG4OL0RuI_COrtFioLAA74FPxC_OTmaOYgIAAt1B8xOzgTQAlIb1ACKlMQARpA_wz8qBgKKvQECg_tFPsj0BLVB_n0BgD1_xr_0Cf08_3--SIKLxEhEO0UBSP3EPccB_ja5SEm7hb2BoEGHwrgAiAALV6AiDs4E0APSHFQAjAJOAFKAGAAaAA,\"}","related_url":"http://www.youtube.com/watch?v=qefv6LRGFQ4","parent-reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","related_vfp":1,"relatedVideo":"yes"}},"isPartner":false,"isOld":true,"docid":"33-9-11-Z0D0D0E8A3055FB0A","isVertical":false,"hasTranscription":false,"reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","dups":[{"nonStopSupported":true,"filmId":"13588841270886561389","duration":155,"origin":"http://www.youtube.com/watch?v=qefv6LRGFQ4","title":{"url":"https://twitter.yandex.com.tr/video/preview/13588841270886561389?how=tm&text=Linux%2BAcademy","text":"How to install Metasploit Rapid7 Pro in kali \u0007[linux\u0007] \u0007[Linux\u0007] \u0007[academy\u0007]"},"clear_title":"How to install Metasploit Rapid7 Pro in kali linux Linux academy","green":{"url":"http://www.youtube.com/watch?v=qefv6LRGFQ4","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x1a4c1be3f46/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2Fqefv6LRGFQ4%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/qefv6LRGFQ4?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=qefv6LRGFQ4","detailUrl":"https://twitter.yandex.com.tr/video/preview/13588841270886561389?how=tm&text=Linux%2BAcademy","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=qefv6LRGFQ4","providerName":"YouTube","url":"http://www.youtube.com/watch?v=qefv6LRGFQ4","thumb":{"online":false,"duration":"2:35","image":"//avatars.mds.yandex.net/get-vthumb/4099577/c09a01ef4d790f046e14313ec70f679e/564x318_1"},"views":3006,"time":"2018-02-19T00:00:00.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ==","name":"Linux Academy","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","verified":false,"interactive":true}}],"isTitleTranslated":false,"shouldUseMediaInstreamConfig":false,"contentTypeId":null,"nonStopSupported":true,"filmId":"13588841270886561389","duration":155,"origin":"http://www.youtube.com/watch?v=qefv6LRGFQ4","title":{"url":"https://twitter.yandex.com.tr/video/preview/13588841270886561389?how=tm&text=Linux%2BAcademy","text":"How to install Metasploit Rapid7 Pro in kali \u0007[linux\u0007] \u0007[Linux\u0007] \u0007[academy\u0007]"},"clear_title":"How to install Metasploit Rapid7 Pro in kali linux Linux academy","green":{"url":"http://www.youtube.com/watch?v=qefv6LRGFQ4","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x1a4c1be3f46/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2Fqefv6LRGFQ4%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/qefv6LRGFQ4?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=qefv6LRGFQ4","detailUrl":"https://twitter.yandex.com.tr/video/preview/13588841270886561389?how=tm&text=Linux%2BAcademy","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=qefv6LRGFQ4","providerName":"YouTube","url":"http://www.youtube.com/watch?v=qefv6LRGFQ4","thumb":{"online":false,"duration":"2:35","image":"//avatars.mds.yandex.net/get-vthumb/4099577/c09a01ef4d790f046e14313ec70f679e/564x318_1"},"views":3006,"time":"2018-02-19T00:00:00.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ==","name":"Linux Academy","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","verified":false,"interactive":true}},{"clear_description":"You can send a Nessus vulnerability analysis report in these formats: HTML (default) PDF CSV (used in spreadsheets, databases) The HTML and PDF formats are very similar and can contain several...","description":"You can send a Nessus vulnerability analysis report in these formats: HTML (default) PDF CSV (used in spreadsheets, databases) The HTML and PDF formats are very similar and can contain several...","videoWidth":854,"videoHeight":480,"isPorno":false,"online":false,"preview":{"url":"https://video-preview.s3.yandex.net/AG_blQAAAAA.mp4","type":"video/mp4"},"extra":{"related":{"text":"How to Read Nessus Scan Report - Linux Academy","related_orig_text":"Linux Academy","related_porno":false,"related_less_3m_off":true,"client":"d2d","no_cnt":1,"related_src":"serp","related":"{\"porno\":false,\"vfp\":1,\"orig_text\":\"Linux Academy\",\"url\":\"http:\\/\\/www.youtube.com\\/watch?v=1_WbqiLSwzU\",\"src\":\"serp\",\"rvb\":\"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_AAEAAUHAQn8AhQCBfn1AQEA4QUD9P77AgDx9P8BAgAAAPj88AIAAAAA8QP3-vwAAAALBQAJBAAAABMJ9_32AAAACgfy9f8BAADs_gD1AgAAAAYNCQD_AAAAAgL2Ef8AAAD8EvT1AQAAAAPw-_wAAAAAIAAtASDIOzgTQAlITlACKnMQABpgJAQANQH_yP4mSOgT3_ED1Qzw8hPpRf8R1gDYBuoI3eeu0CUO__zmCf2tAAAAIw-mKB4A92_7z-X30eP82rDpLvxdGRMx2gb5Bezef_4YzNTNHhT9AEbmzfY3CeMcQugOIAAtBnEoOzgTQAlIb1ACKlMQARpAAw8IvgsGHvkDCwTlFfciyhPgBPj3BAb4_hH91yD-_fr0AhgDJAYdI-P8CfoBGfYVAPPmABoHAA0E_oEDEw7n8iAALdAtnTs4E0APSHFQAjAJOAFKAGAAaAA,\"}","related_url":"http://www.youtube.com/watch?v=1_WbqiLSwzU","parent-reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","related_vfp":1,"relatedVideo":"yes"}},"isPartner":false,"isOld":true,"docid":"33-2-9-Z0EEFD17F1DA21135","isVertical":false,"hasTranscription":false,"reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","dups":[{"nonStopSupported":true,"filmId":"15474213565329913965","duration":261,"origin":"http://www.youtube.com/watch?v=1_WbqiLSwzU","title":{"url":"https://twitter.yandex.com.tr/video/preview/15474213565329913965?how=tm&text=Linux%2BAcademy","text":"How to Read Nessus Scan Report - \u0007[Linux\u0007] \u0007[Academy\u0007]"},"clear_title":"How to Read Nessus Scan Report - Linux Academy","green":{"url":"http://www.youtube.com/watch?v=1_WbqiLSwzU","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x1a4c1be3f46/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2F1_WbqiLSwzU%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/1_WbqiLSwzU?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=1_WbqiLSwzU","detailUrl":"https://twitter.yandex.com.tr/video/preview/15474213565329913965?how=tm&text=Linux%2BAcademy","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=1_WbqiLSwzU","providerName":"YouTube","url":"http://www.youtube.com/watch?v=1_WbqiLSwzU","thumb":{"online":false,"duration":"4:21","image":"//avatars.mds.yandex.net/get-vthumb/3744479/95c7b63dcb9a1ca51e8c47996034a9e7/564x318_1"},"views":4613,"time":"2018-02-16T20:30:00.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ==","name":"Linux Academy","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","verified":false,"interactive":true}}],"isTitleTranslated":false,"shouldUseMediaInstreamConfig":false,"contentTypeId":null,"nonStopSupported":true,"filmId":"15474213565329913965","duration":261,"origin":"http://www.youtube.com/watch?v=1_WbqiLSwzU","title":{"url":"https://twitter.yandex.com.tr/video/preview/15474213565329913965?how=tm&text=Linux%2BAcademy","text":"How to Read Nessus Scan Report - \u0007[Linux\u0007] \u0007[Academy\u0007]"},"clear_title":"How to Read Nessus Scan Report - Linux Academy","green":{"url":"http://www.youtube.com/watch?v=1_WbqiLSwzU","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x1a4c1be3f46/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2F1_WbqiLSwzU%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/1_WbqiLSwzU?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=1_WbqiLSwzU","detailUrl":"https://twitter.yandex.com.tr/video/preview/15474213565329913965?how=tm&text=Linux%2BAcademy","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=1_WbqiLSwzU","providerName":"YouTube","url":"http://www.youtube.com/watch?v=1_WbqiLSwzU","thumb":{"online":false,"duration":"4:21","image":"//avatars.mds.yandex.net/get-vthumb/3744479/95c7b63dcb9a1ca51e8c47996034a9e7/564x318_1"},"views":4613,"time":"2018-02-16T20:30:00.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ==","name":"Linux Academy","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","verified":false,"interactive":true}},{"clear_description":"Scanning policies can be compiled into Nessus to define in more detail the types of vulnerability it evaluates and the types of scans that are performed.Nessus is one of the most powerful and...","description":"Scanning policies can be compiled into Nessus to define in more detail the types of vulnerability it evaluates and the types of scans that are performed.Nessus is one of the most powerful and...","videoWidth":854,"videoHeight":480,"isPorno":false,"online":false,"preview":{"url":"https://video-preview.s3.yandex.net/GpwGQwIAAAA.mp4","type":"video/mp4"},"extra":{"related":{"text":"Creating scan policies with Nessus in kali linux - Linux Academy","related_orig_text":"Linux Academy","related_porno":false,"related_less_3m_off":true,"client":"d2d","no_cnt":1,"related_src":"serp","related":"{\"porno\":false,\"vfp\":1,\"orig_text\":\"Linux Academy\",\"url\":\"http:\\/\\/rutube.ru\\/video\\/b02c007a89930cc37090a93a4f9484fc\\/\",\"src\":\"serp\",\"rvb\":\"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_E_YBggQkAZAEK5XT1RAqiwEQARp4gQwVBgAE_AAD9PoJBwn7Ah8A_P7zAwMA6wL7BAAAAAAA5wgBAwAAAAL99wIKAAAA9vT9_f3_AAAGAA3_BQAAACD98vr8AAAA_QL2Bf4BAAD1_P7tAQAAAP4OFf8AAAAACQIBFP8AAAD-9fjsAAAAAP_1Af4AAAAAIAAtASDIOzgTQAlITlACKnMQABpgEA0AGP4j_uIoQ-H6_xbe5Q775Rb4Mf8k2ADXAwn-E-PJ0vYY_xHTBum5AAAAFxW3NhgA_Vr67e7M7Nzrz8r1NAt_-hAfAzcF7-byQgET3tTRQxgIAD3w_uM0CwMbRdUlIAAtN786OzgTQAlIb1ACKlMQARpAODzhzDIROBEBC_ziK272vxHHHPj_-AHt7BjywzHuAwreD1cSDxATIgf2-Sz87_QmJvzJykES9-sJGoHdHMvfDCAALY75Sjs4E0APSHFQAjAJOAFKAGAAaAA,\"}","related_url":"http://rutube.ru/video/b02c007a89930cc37090a93a4f9484fc/","parent-reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","related_vfp":1,"relatedVideo":"yes"}},"isPartner":false,"isOld":true,"docid":"33-10-16-Z2665ACEE9ADE7F8A","isVertical":false,"hasTranscription":true,"reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","dups":[{"nonStopSupported":true,"filmId":"7677755737145296716","duration":270,"origin":"http://www.youtube.com/watch?v=JRbT97YfTuI","title":{"url":"https://twitter.yandex.com.tr/video/preview/7677755737145296716?how=tm&text=Linux%2BAcademy","text":"How to use Nessus in kali linux - Linux academy"},"clear_title":"How to use Nessus in kali linux - Linux academy","green":{"url":"http://www.youtube.com/watch?v=JRbT97YfTuI","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x1a4c1be3f46/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2FJRbT97YfTuI%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/JRbT97YfTuI?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=JRbT97YfTuI","detailUrl":"https://twitter.yandex.com.tr/video/preview/7677755737145296716?how=tm&text=Linux%2BAcademy","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=JRbT97YfTuI","providerName":"YouTube","url":"http://www.youtube.com/watch?v=JRbT97YfTuI","thumb":{"online":false,"duration":"4:30","image":"//avatars.mds.yandex.net/get-vthumb/3437061/7a703697152175f653a2c443bd352ab6/564x318_1"},"views":760,"time":"2018-02-12T20:30:00.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":false,"channel":{}},{"nonStopSupported":true,"filmId":"17646817791513898132","duration":246,"origin":"http://rutube.ru/video/b02c007a89930cc37090a93a4f9484fc/","title":{"url":"https://twitter.yandex.com.tr/video/preview/17646817791513898132?how=tm&text=Linux%2BAcademy","text":"Creating scan policies with Nessus in kali \u0007[linux\u0007] - \u0007[Linux\u0007] \u0007[Academy\u0007]"},"clear_title":"Creating scan policies with Nessus in kali linux - Linux Academy","green":{"url":"http://rutube.ru/video/b02c007a89930cc37090a93a4f9484fc/","text":"Rutube","hostname":"rutube.ru"},"player":{"baseUrl":"//yastatic.net/video-player/0x1a4c1be3f46/pages-common/rutube/rutube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Frutube.ru%2Fplay%2Fembed%2Fb02c007a89930cc37090a93a4f9484fc%2F%3FautoStart%3Dtrue%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E"},"playerId":"rutube","isQuasar":false,"playerUri":"\u003ciframe src=\"//rutube.ru/play/embed/b02c007a89930cc37090a93a4f9484fc/?wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://rutube.ru/video/b02c007a89930cc37090a93a4f9484fc/","detailUrl":"https://twitter.yandex.com.tr/video/preview/17646817791513898132?how=tm&text=Linux%2BAcademy","clipHost":"rutube.ru","clipHref":"http://rutube.ru/video/b02c007a89930cc37090a93a4f9484fc/","providerName":"Rutube","url":"http://rutube.ru/video/b02c007a89930cc37090a93a4f9484fc/","thumb":{"online":false,"duration":"4:06","image":"//avatars.mds.yandex.net/get-vthumb/1347329/6b99c11c8e9d45f3dd4cccd78741b96c/564x318_1"},"views":0,"time":"2018-02-12T20:30:00.000Z","faviconHost":"http://rutube.ru","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":false,"channel":{"id":"cnV0dWJlLnJ1OzM0OTU3NzE3","name":"Технический Дом","url":"/video/search?channelId=cnV0dWJlLnJ1OzM0OTU3NzE3&how=tm&text=%D0%A2%D0%B5%D1%85%D0%BD%D0%B8%D1%87%D0%B5%D1%81%D0%BA%D0%B8%D0%B9+%D0%94%D0%BE%D0%BC","verified":false,"interactive":true}}],"isTitleTranslated":false,"shouldUseMediaInstreamConfig":false,"contentTypeId":null,"nonStopSupported":true,"filmId":"7677755737145296716","duration":270,"origin":"http://www.youtube.com/watch?v=JRbT97YfTuI","title":{"url":"https://twitter.yandex.com.tr/video/preview/7677755737145296716?how=tm&text=Linux%2BAcademy","text":"How to use Nessus in kali linux - Linux academy"},"clear_title":"How to use Nessus in kali linux - Linux academy","green":{"url":"http://www.youtube.com/watch?v=JRbT97YfTuI","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x1a4c1be3f46/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2FJRbT97YfTuI%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/JRbT97YfTuI?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=JRbT97YfTuI","detailUrl":"https://twitter.yandex.com.tr/video/preview/7677755737145296716?how=tm&text=Linux%2BAcademy","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=JRbT97YfTuI","providerName":"YouTube","url":"http://www.youtube.com/watch?v=JRbT97YfTuI","thumb":{"online":false,"duration":"4:30","image":"//avatars.mds.yandex.net/get-vthumb/3437061/7a703697152175f653a2c443bd352ab6/564x318_1"},"views":760,"time":"2018-02-12T20:30:00.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":false,"channel":{}},{"clear_description":"See how to use Kali Linux for hacking in this 2017 tutorial including Kali Linux installation and basic Linux Command Line Interface (CLI). To begin, see how to get Kali Linux setup in a virtual...","description":"See how to use Kali \u0007[Linux\u0007] for hacking in this 2017 tutorial including Kali \u0007[Linux\u0007] installation and basic \u0007[Linux\u0007] Command Line Interface (CLI). To begin, see how to get Kali \u0007[Linux\u0007] setup in a virtual...","videoWidth":1290,"videoHeight":1080,"isPorno":false,"online":false,"extra":{"related":{"text":"Kali Linux - vid 8 - Downloading Kali Linux - Linux Academy","related_orig_text":"Linux Academy","related_porno":false,"related_less_3m_off":true,"client":"d2d","no_cnt":1,"related_src":"serp","related":"{\"porno\":false,\"vfp\":1,\"orig_text\":\"Linux Academy\",\"url\":\"http:\\/\\/rutube.ru\\/video\\/8622a550ae56c7569007ae62d240f967\\/\",\"src\":\"serp\",\"rvb\":\"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_w8BCfsCGvsG__YCAgDo-vz-BP4BAPjt_wYHAAAA_QL7BgEAAAD18gEFA_8AAP__B_kEAAAAEwDzAv8AAAD--gP__wEAAPz7_fYCAAAA-gUF9_8AAAADBgIHAAAAAP72-O4AAAAA9v3-AAAAAAAgAC3Gidg7OBNACUhOUAIqcxAAGmAoDgAHEhsC2xcS7gIf9_zt--rq-fwXABXvAN_9DSMa-ebf3xEA9fb5-8wAAAAKF7USJgD8P_YP0_ESyuv53u4QDH__FAoDLQPv3wAm8iXq7fwyHBAAEPUP_CXqDPs78iYgAC2seG87OBNACUhvUAIqUxABGkApVgbTAe8lzwPx-tMHWvzHG9Ad-QnvAPPnFPrILfUCDNMZUgL1FQI-5gH3GPf79hMLEdXhNAP19xMNgfEOwuDqIAAtU_xcOzgTQA9IcVACMAk4AUoAYABoAA,,\"}","related_url":"http://rutube.ru/video/8622a550ae56c7569007ae62d240f967/","parent-reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","related_vfp":1,"relatedVideo":"yes"}},"isPartner":false,"isOld":true,"docid":"33-0-7-Z21C97A50C768E6F2","isVertical":false,"hasTranscription":false,"reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","dups":[{"nonStopSupported":true,"filmId":"5466599671689468807","duration":458,"origin":"http://www.youtube.com/watch?v=tB8xdcdULR0","title":{"url":"https://twitter.yandex.com.tr/video/preview/5466599671689468807?how=tm&text=Linux%2BAcademy","text":"Kali Linux - vid 8 - Downloading Kali Linux - Linux Academy"},"clear_title":"Kali Linux - vid 8 - Downloading Kali Linux - Linux Academy","green":{"url":"http://www.youtube.com/watch?v=tB8xdcdULR0","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x1a4c1be3f46/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2FtB8xdcdULR0%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/tB8xdcdULR0?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=tB8xdcdULR0","detailUrl":"https://twitter.yandex.com.tr/video/preview/5466599671689468807?how=tm&text=Linux%2BAcademy","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=tB8xdcdULR0","providerName":"YouTube","url":"http://www.youtube.com/watch?v=tB8xdcdULR0","thumb":{"online":false,"duration":"7:38","image":"//avatars.mds.yandex.net/get-vthumb/3005370/f62760029339e493d54025ff72f9cff9/564x318_1"},"views":982,"time":"2017-09-08T00:00:00.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":false,"channel":{}},{"nonStopSupported":true,"filmId":"675832350034190167","duration":459,"origin":"http://rutube.ru/video/8622a550ae56c7569007ae62d240f967/","title":{"url":"https://twitter.yandex.com.tr/video/preview/675832350034190167?how=tm&text=Linux%2BAcademy","text":"Kali \u0007[Linux\u0007] - vid 8 - Downloading Kali \u0007[Linux\u0007] - \u0007[Linux\u0007] \u0007[Academy\u0007]"},"clear_title":"Kali Linux - vid 8 - Downloading Kali Linux - Linux Academy","green":{"url":"http://rutube.ru/video/8622a550ae56c7569007ae62d240f967/","text":"Rutube","hostname":"rutube.ru"},"player":{"baseUrl":"//yastatic.net/video-player/0x1a4c1be3f46/pages-common/rutube/rutube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Frutube.ru%2Fplay%2Fembed%2F8622a550ae56c7569007ae62d240f967%2F%3FautoStart%3Dtrue%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E"},"playerId":"rutube","isQuasar":false,"playerUri":"\u003ciframe src=\"//rutube.ru/play/embed/8622a550ae56c7569007ae62d240f967/?wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://rutube.ru/video/8622a550ae56c7569007ae62d240f967/","detailUrl":"https://twitter.yandex.com.tr/video/preview/675832350034190167?how=tm&text=Linux%2BAcademy","clipHost":"rutube.ru","clipHref":"http://rutube.ru/video/8622a550ae56c7569007ae62d240f967/","providerName":"Rutube","url":"http://rutube.ru/video/8622a550ae56c7569007ae62d240f967/","thumb":{"online":false,"duration":"7:39","image":"//avatars.mds.yandex.net/get-vthumb/2225548/dcb236309f1f80b0a83f1cf73cf58d86/564x318_1"},"views":0,"time":"2017-09-08T00:00:00.000Z","faviconHost":"http://rutube.ru","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":false,"channel":{"id":"cnV0dWJlLnJ1OzMzNzg5MDQw","name":"MySQL Проекты","url":"/video/search?channelId=cnV0dWJlLnJ1OzMzNzg5MDQw&how=tm&text=MySQL+%D0%9F%D1%80%D0%BE%D0%B5%D0%BA%D1%82%D1%8B","verified":false,"interactive":true}}],"isTitleTranslated":false,"shouldUseMediaInstreamConfig":false,"contentTypeId":null,"nonStopSupported":true,"filmId":"5466599671689468807","duration":458,"origin":"http://www.youtube.com/watch?v=tB8xdcdULR0","title":{"url":"https://twitter.yandex.com.tr/video/preview/5466599671689468807?how=tm&text=Linux%2BAcademy","text":"Kali Linux - vid 8 - Downloading Kali Linux - Linux Academy"},"clear_title":"Kali Linux - vid 8 - Downloading Kali Linux - Linux Academy","green":{"url":"http://www.youtube.com/watch?v=tB8xdcdULR0","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x1a4c1be3f46/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2FtB8xdcdULR0%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/tB8xdcdULR0?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=tB8xdcdULR0","detailUrl":"https://twitter.yandex.com.tr/video/preview/5466599671689468807?how=tm&text=Linux%2BAcademy","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=tB8xdcdULR0","providerName":"YouTube","url":"http://www.youtube.com/watch?v=tB8xdcdULR0","thumb":{"online":false,"duration":"7:38","image":"//avatars.mds.yandex.net/get-vthumb/3005370/f62760029339e493d54025ff72f9cff9/564x318_1"},"views":982,"time":"2017-09-08T00:00:00.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":false,"channel":{}},{"clear_description":"It is not a complete security solution, but a small part of a good security strategy.. . Nessus is an open source remote security scanning tool, which scans a computer and generates an alert if...","description":"It is not a complete security solution, but a small part of a good security strategy.. . Nessus is an open source remote security scanning tool, which scans a computer and generates an alert if...","videoWidth":854,"videoHeight":480,"isPorno":false,"online":false,"preview":{"url":"https://video-preview.s3.yandex.net/zIS7MAAAAAA.mp4","type":"video/mp4"},"extra":{"related":{"text":"How to Install and Use Nessus Vulnerability Scanner - Linux Academy","related_orig_text":"Linux Academy","related_porno":false,"related_less_3m_off":true,"client":"d2d","no_cnt":1,"related_src":"serp","related":"{\"porno\":false,\"vfp\":1,\"orig_text\":\"Linux Academy\",\"url\":\"http:\\/\\/www.youtube.com\\/watch?v=oFvVB_PIfbw\",\"src\":\"serp\",\"rvb\":\"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_gAC_YED_oN-gM3-PwH8gcHAdUB9f76-AQA8u3xAgL_AADzBe_6CwAAAAP6_Pr9_QEABAMEA_sAAAAjDvz4-wAAAP0C9QX-AQAA7P3y-AIAAAAI_RYFAAAAAAX1-QUCAAABCQj17gEAAAAQ_gH0AAAAACAALVoYwTs4E0AJSE5QAipzEAAaYDf_AEv1-b7VD2beEfDl8O0w_h8o4xz_6sMA-wb16vD10LM9OP8b3gQCpAAAABoDlB4DABJ_B9IB7O8QF6fa7DQhZRoIEeQZFvP_zmYB3cTZzT1QHwBX1rPeS73UJDL5FyAALUo_FDs4E0AJSG9QAipTEAEaQP8OALABCiDrBAYG6gv9Is8U3wv89AsC-AQU_9Qi-wL5-uUwCigGHR3oBAQQ_w32F_305fgpG_QS_gOBCRcR5fogAC3QdpI7OBNAD0hxUAIwCTgBSgBSCQgPEJICGAAwAWAAaAA,\"}","related_url":"http://www.youtube.com/watch?v=oFvVB_PIfbw","parent-reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","related_vfp":1,"relatedVideo":"yes"}},"isPartner":false,"isOld":true,"docid":"33-5-15-ZB232C766EF859189","isVertical":false,"hasTranscription":false,"reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","dups":[{"nonStopSupported":true,"filmId":"9782130221093995089","duration":307,"origin":"http://www.youtube.com/watch?v=oFvVB_PIfbw","title":{"url":"https://twitter.yandex.com.tr/video/preview/9782130221093995089?how=tm&text=Linux%2BAcademy","text":"How to Install and Use Nessus Vulnerability Scanner - \u0007[Linux\u0007] \u0007[Academy\u0007]"},"clear_title":"How to Install and Use Nessus Vulnerability Scanner - Linux Academy","green":{"url":"http://www.youtube.com/watch?v=oFvVB_PIfbw","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x1a4c1be3f46/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2FoFvVB_PIfbw%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/oFvVB_PIfbw?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=oFvVB_PIfbw","detailUrl":"https://twitter.yandex.com.tr/video/preview/9782130221093995089?how=tm&text=Linux%2BAcademy","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=oFvVB_PIfbw","providerName":"YouTube","url":"http://www.youtube.com/watch?v=oFvVB_PIfbw","thumb":{"online":false,"duration":"5:07","image":"//avatars.mds.yandex.net/get-vthumb/3906919/88f89ef52733db6ba1363e1e6ee29588/564x318_1"},"views":1440,"time":"2018-02-09T00:00:00.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ==","name":"Linux Academy","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","verified":false,"interactive":true}}],"isTitleTranslated":false,"shouldUseMediaInstreamConfig":false,"contentTypeId":null,"nonStopSupported":true,"filmId":"9782130221093995089","duration":307,"origin":"http://www.youtube.com/watch?v=oFvVB_PIfbw","title":{"url":"https://twitter.yandex.com.tr/video/preview/9782130221093995089?how=tm&text=Linux%2BAcademy","text":"How to Install and Use Nessus Vulnerability Scanner - \u0007[Linux\u0007] \u0007[Academy\u0007]"},"clear_title":"How to Install and Use Nessus Vulnerability Scanner - Linux Academy","green":{"url":"http://www.youtube.com/watch?v=oFvVB_PIfbw","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x1a4c1be3f46/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2FoFvVB_PIfbw%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/oFvVB_PIfbw?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=oFvVB_PIfbw","detailUrl":"https://twitter.yandex.com.tr/video/preview/9782130221093995089?how=tm&text=Linux%2BAcademy","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=oFvVB_PIfbw","providerName":"YouTube","url":"http://www.youtube.com/watch?v=oFvVB_PIfbw","thumb":{"online":false,"duration":"5:07","image":"//avatars.mds.yandex.net/get-vthumb/3906919/88f89ef52733db6ba1363e1e6ee29588/564x318_1"},"views":1440,"time":"2018-02-09T00:00:00.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ==","name":"Linux Academy","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","verified":false,"interactive":true}},{"clear_description":"Burpsuite is a collection of tools and add-ons for any web application security test included in a single executable jar file. Then, even the Https connections that pass through burpsuite are...","description":"Burpsuite is a collection of tools and add-ons for any web application security test included in a single executable jar file. Then, even the Https connections that pass through burpsuite are...","videoWidth":854,"videoHeight":480,"isPorno":false,"online":false,"preview":{"url":"https://video-preview.s3.yandex.net/7q3QjgAAAAA.mp4","type":"video/mp4"},"extra":{"related":{"text":"How to use burp Suite to brute force - Linux Academy","related_orig_text":"Linux Academy","related_porno":false,"related_less_3m_off":true,"client":"d2d","no_cnt":1,"related_src":"serp","related":"{\"porno\":false,\"vfp\":1,\"orig_text\":\"Linux Academy\",\"url\":\"http:\\/\\/www.youtube.com\\/watch?v=I3MpD_aeBVA\",\"src\":\"serp\",\"rvb\":\"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_QAA-wYJ9wn8AhYC8fr0AgIA2AH2__r4BAAB7vQJAQAAAP8OAAn6AAAA_ff3Avr-AAAJ_wUEBQAAAB75AvT9AAAA_f3rAAABAADs8QT0AgAAAPMNDff_AAAAAAr6CQAAAAAEAQPtAQAAAP___v8AAAAAIAAt8GDMOzgTQAlITlACKnMQABpgLvQAQOnvytkgHev9xtH0-h4C7fC-U_8Hzf8Q_uMTA-fYmwb7__nm-wWgAAAAMiWhGg8AP3_xs9QOuuHqnM_9JRhrEvku1h_KDP7tYgT27ebqHTMeAFXTyM5jCRMJLdwFIAAtVnAWOzgTQAlIb1ACKlMQARpA8hX-qAERMvcEAQHvKBIn3xLWBPn2Ewb3BxcC0Cf9-vL24xMHKg8fFMEW-gvyH_UdGgDhDTQV8yUGCoEOGATi9yAALU0Egzs4E0APSHFQAjAJOAFKAGAAaAA,\"}","related_url":"http://www.youtube.com/watch?v=I3MpD_aeBVA","parent-reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","related_vfp":1,"relatedVideo":"yes"}},"isPartner":false,"isOld":true,"docid":"33-10-15-Z0B898723C694966B","isVertical":false,"hasTranscription":false,"reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","dups":[{"nonStopSupported":true,"filmId":"16909835499892697883","duration":347,"origin":"http://www.youtube.com/watch?v=I3MpD_aeBVA","title":{"url":"https://twitter.yandex.com.tr/video/preview/16909835499892697883?how=tm&text=Linux%2BAcademy","text":"How to use burp Suite to brute force - \u0007[Linux\u0007] \u0007[Academy\u0007]"},"clear_title":"How to use burp Suite to brute force - Linux Academy","green":{"url":"http://www.youtube.com/watch?v=I3MpD_aeBVA","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x1a4c1be3f46/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2FI3MpD_aeBVA%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/I3MpD_aeBVA?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=I3MpD_aeBVA","detailUrl":"https://twitter.yandex.com.tr/video/preview/16909835499892697883?how=tm&text=Linux%2BAcademy","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=I3MpD_aeBVA","providerName":"YouTube","url":"http://www.youtube.com/watch?v=I3MpD_aeBVA","thumb":{"online":false,"duration":"5:47","image":"//avatars.mds.yandex.net/get-vthumb/3272903/d9cb64f3e074b3d4230b7943a3333e5e/564x318_1"},"views":92,"time":"2018-02-07T00:00:00.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ==","name":"Linux Academy","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","verified":false,"interactive":true}}],"isTitleTranslated":false,"shouldUseMediaInstreamConfig":false,"contentTypeId":null,"nonStopSupported":true,"filmId":"16909835499892697883","duration":347,"origin":"http://www.youtube.com/watch?v=I3MpD_aeBVA","title":{"url":"https://twitter.yandex.com.tr/video/preview/16909835499892697883?how=tm&text=Linux%2BAcademy","text":"How to use burp Suite to brute force - \u0007[Linux\u0007] \u0007[Academy\u0007]"},"clear_title":"How to use burp Suite to brute force - Linux Academy","green":{"url":"http://www.youtube.com/watch?v=I3MpD_aeBVA","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x1a4c1be3f46/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2FI3MpD_aeBVA%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/I3MpD_aeBVA?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=I3MpD_aeBVA","detailUrl":"https://twitter.yandex.com.tr/video/preview/16909835499892697883?how=tm&text=Linux%2BAcademy","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=I3MpD_aeBVA","providerName":"YouTube","url":"http://www.youtube.com/watch?v=I3MpD_aeBVA","thumb":{"online":false,"duration":"5:47","image":"//avatars.mds.yandex.net/get-vthumb/3272903/d9cb64f3e074b3d4230b7943a3333e5e/564x318_1"},"views":92,"time":"2018-02-07T00:00:00.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ==","name":"Linux Academy","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","verified":false,"interactive":true}},{"type":"video_direct","groudId":"11","directId":"R-I-113683-5","isFake":true},{"clear_description":"It is capable of intercepting traffic in a network segment, capturing passwords and performing active eavesdropping against a series of common protocols.","description":"It is capable of intercepting traffic in a network segment, capturing passwords and performing active eavesdropping against a series of common protocols.","videoWidth":854,"videoHeight":480,"isPorno":false,"online":false,"preview":{"url":"https://video-preview.s3.yandex.net/kPuXhgAAAAA.mp4","type":"video/mp4"},"extra":{"related":{"text":"How to setup etterap on kali linux - Linux Academy","related_orig_text":"Linux Academy","related_porno":false,"related_less_3m_off":true,"client":"d2d","no_cnt":1,"related_src":"serp","related":"{\"porno\":false,\"vfp\":1,\"orig_text\":\"Linux Academy\",\"url\":\"http:\\/\\/www.youtube.com\\/watch?v=FYsVbm8SPow\",\"src\":\"serp\",\"rvb\":\"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_E5YCggQkAYAEKyqLARABGniBBRAECf4CAAr3BA36DPsDGvsG__YCAgDo-vz-BP4BAATy_gIEAAAA-v8BBggAAAD18gEFA_8AAAEBAwEEAAAAEwDzAv8AAAD5-_kCAAEAAPb6BvkCAAAA9wUK_v8AAAAIA_oHAAAAAAn67_UBAAAA9fT7_wAAAAAgAC3Gidg7OBNACUhOUAIqcxAAGmAn_gAL-Aui0yFb2QER8wbo_NfT_-lK_xzM__nqBUQZ38O9Fxv_FfYQ9aEAAAAcDYEIKAARfRTv0vz67Oex79s-91si8g-9MPXYBd1r6A7R1MMoJAQAQszr01TD5_dc1jIgAC16zRQ7OBNACUhvUAIqUxABGkD3CwWkFQYvAwQNCO0g-yTNE84E-_YJAfgDGP7NKff4-_PwJ_8gGC8M6gcNKPkW9xsL9NruHyTuHvAMgRgl_t__IAAtJHWCOzgTQA9IcVACMAk4AUoAYABoAA,,\"}","related_url":"http://www.youtube.com/watch?v=FYsVbm8SPow","parent-reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","related_vfp":1,"relatedVideo":"yes"}},"isPartner":false,"isOld":true,"docid":"33-8-1-Z8B4CDF8760850CC6","isVertical":false,"hasTranscription":false,"reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","dups":[{"nonStopSupported":true,"filmId":"433682869455237169","duration":278,"origin":"http://www.youtube.com/watch?v=FYsVbm8SPow","title":{"url":"https://twitter.yandex.com.tr/video/preview/433682869455237169?how=tm&text=Linux%2BAcademy","text":"How to setup etterap on kali \u0007[linux\u0007] - \u0007[Linux\u0007] \u0007[Academy\u0007]"},"clear_title":"How to setup etterap on kali linux - Linux Academy","green":{"url":"http://www.youtube.com/watch?v=FYsVbm8SPow","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x1a4c1be3f46/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2FFYsVbm8SPow%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/FYsVbm8SPow?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=FYsVbm8SPow","detailUrl":"https://twitter.yandex.com.tr/video/preview/433682869455237169?how=tm&text=Linux%2BAcademy","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=FYsVbm8SPow","providerName":"YouTube","url":"http://www.youtube.com/watch?v=FYsVbm8SPow","thumb":{"online":false,"duration":"4:38","image":"//avatars.mds.yandex.net/get-vthumb/1791085/860d35509c219a4f03fc0ceb8a160146/564x318_1"},"views":40,"time":"2018-02-05T07:00:00.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ==","name":"Linux Academy","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","verified":false,"interactive":true}}],"isTitleTranslated":false,"shouldUseMediaInstreamConfig":false,"contentTypeId":null,"nonStopSupported":true,"filmId":"433682869455237169","duration":278,"origin":"http://www.youtube.com/watch?v=FYsVbm8SPow","title":{"url":"https://twitter.yandex.com.tr/video/preview/433682869455237169?how=tm&text=Linux%2BAcademy","text":"How to setup etterap on kali \u0007[linux\u0007] - \u0007[Linux\u0007] \u0007[Academy\u0007]"},"clear_title":"How to setup etterap on kali linux - Linux Academy","green":{"url":"http://www.youtube.com/watch?v=FYsVbm8SPow","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x1a4c1be3f46/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2FFYsVbm8SPow%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/FYsVbm8SPow?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=FYsVbm8SPow","detailUrl":"https://twitter.yandex.com.tr/video/preview/433682869455237169?how=tm&text=Linux%2BAcademy","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=FYsVbm8SPow","providerName":"YouTube","url":"http://www.youtube.com/watch?v=FYsVbm8SPow","thumb":{"online":false,"duration":"4:38","image":"//avatars.mds.yandex.net/get-vthumb/1791085/860d35509c219a4f03fc0ceb8a160146/564x318_1"},"views":40,"time":"2018-02-05T07:00:00.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ==","name":"Linux Academy","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","verified":false,"interactive":true}},{"clear_description":"See how to use Kali Linux for hacking in this 2017 tutorial including Kali Linux installation and basic Linux Command Line Interface (CLI). To begin, see how to get Kali Linux setup in a virtual...","description":"See how to use Kali \u0007[Linux\u0007] for hacking in this 2017 tutorial including Kali \u0007[Linux\u0007] installation and basic \u0007[Linux\u0007] Command Line Interface (CLI). To begin, see how to get Kali \u0007[Linux\u0007] setup in a virtual...","videoWidth":854,"videoHeight":480,"isPorno":false,"online":false,"preview":{"url":"https://video-preview.s3.yandex.net/5JDOFAAAAAA.mp4","type":"video/mp4"},"extra":{"related":{"text":"Scapy Network discovery tool Tutorial for beginners","related_orig_text":"Linux Academy","related_porno":false,"related_less_3m_off":true,"client":"d2d","no_cnt":1,"related_src":"serp","related":"{\"porno\":false,\"vfp\":1,\"orig_text\":\"Linux Academy\",\"url\":\"http:\\/\\/www.youtube.com\\/watch?v=dwqiQkZFoAU\",\"src\":\"serp\",\"rvb\":\"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-AcFCQAH_QIWAvzy9QICAPUA9PQDAv8ACRD6BPwBAAAF8voE-wAAAAD78Q34_gAAEwv19gQAAAAC-_j6AQAAAAP89Qj_AQAA8fIBAfUCAAEH7wYN_wAAAPkO_Pv_AAAA9gn49QAAAAAP9wb7AAEAACAALQix0js4E0AJSE5QAipzEAAaYEAAAED2Ctz9HGHtHuej7vgF-v8Fzib_8tkA_RD7Mf0R57r5Kv8PzPv_qQAAADMiwkzyAAl26Nn2Evof86Lc7hc1YOv9E9YUEg7kw38f8evazCcjKQAo67PvI9wJKz4ZICAALShyIDs4E0AJSG9QAipTEAEaQBQG_K_y-AjkAxAG7QcUGskI3Az_-gcI_v4W_9ch9QIK_OkiCiYHFhrwBxYD-w31FPjy7eoeFQYKC_uB_xUR5wQgAC1kOpg7OBNAD0hxUAIwCTgBSgBgAGgA\"}","related_url":"http://www.youtube.com/watch?v=dwqiQkZFoAU","parent-reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","related_vfp":1,"relatedVideo":"yes"}},"isPartner":false,"isOld":true,"docid":"33-2-7-Z96EDBDBC9AB6187C","isVertical":false,"hasTranscription":false,"reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","dups":[{"nonStopSupported":true,"filmId":"9920158304544978019","duration":296,"origin":"http://www.youtube.com/watch?v=dwqiQkZFoAU","title":{"url":"https://twitter.yandex.com.tr/video/preview/9920158304544978019?how=tm&text=Linux%2BAcademy","text":"Scapy Network discovery tool Tutorial for beginners"},"clear_title":"Scapy Network discovery tool Tutorial for beginners","green":{"url":"http://www.youtube.com/watch?v=dwqiQkZFoAU","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x1a4c1be3f46/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2FdwqiQkZFoAU%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/dwqiQkZFoAU?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=dwqiQkZFoAU","detailUrl":"https://twitter.yandex.com.tr/video/preview/9920158304544978019?how=tm&text=Linux%2BAcademy","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=dwqiQkZFoAU","providerName":"YouTube","url":"http://www.youtube.com/watch?v=dwqiQkZFoAU","thumb":{"online":false,"duration":"4:56","image":"//avatars.mds.yandex.net/get-vthumb/3725379/3475f97794f79af704c49b937e509152/564x318_1"},"views":1272,"time":"2018-02-02T00:00:00.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ==","name":"Linux Academy","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","verified":false,"interactive":true}}],"isTitleTranslated":false,"shouldUseMediaInstreamConfig":false,"contentTypeId":null,"nonStopSupported":true,"filmId":"9920158304544978019","duration":296,"origin":"http://www.youtube.com/watch?v=dwqiQkZFoAU","title":{"url":"https://twitter.yandex.com.tr/video/preview/9920158304544978019?how=tm&text=Linux%2BAcademy","text":"Scapy Network discovery tool Tutorial for beginners"},"clear_title":"Scapy Network discovery tool Tutorial for beginners","green":{"url":"http://www.youtube.com/watch?v=dwqiQkZFoAU","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x1a4c1be3f46/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2FdwqiQkZFoAU%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/dwqiQkZFoAU?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=dwqiQkZFoAU","detailUrl":"https://twitter.yandex.com.tr/video/preview/9920158304544978019?how=tm&text=Linux%2BAcademy","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=dwqiQkZFoAU","providerName":"YouTube","url":"http://www.youtube.com/watch?v=dwqiQkZFoAU","thumb":{"online":false,"duration":"4:56","image":"//avatars.mds.yandex.net/get-vthumb/3725379/3475f97794f79af704c49b937e509152/564x318_1"},"views":1272,"time":"2018-02-02T00:00:00.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ==","name":"Linux Academy","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","verified":false,"interactive":true}},{"clear_description":"fping is a ping-like program that uses the ICMP protocol to determine whether a host is active. When a host replies, it is noted and removed from the list of hosts to be checked. Instead of...","description":"fping is a ping-like program that uses the ICMP protocol to determine whether a host is active. When a host replies, it is noted and removed from the list of hosts to be checked. Instead of...","videoWidth":854,"videoHeight":480,"isPorno":false,"online":false,"preview":{"url":"https://video-preview.s3.yandex.net/a1LtRwAAAAA.mp4","type":"video/mp4"},"extra":{"related":{"text":"How to use fping in kali linux - Linux Academy","related_orig_text":"Linux Academy","related_porno":false,"related_less_3m_off":true,"client":"d2d","no_cnt":1,"related_src":"serp","related":"{\"porno\":false,\"vfp\":1,\"orig_text\":\"Linux Academy\",\"url\":\"http:\\/\\/www.youtube.com\\/watch?v=knRDczIQo8Q\",\"src\":\"serp\",\"rvb\":\"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-AgAD9fsJBgn8AhwA_P70AwMA6Pr8_gT-AQAE8v4CBAAAAP0C-wYBAAAA_PgHC__-AAAGAAz_BAAAAB798_r8AAAA-fv5AgABAAD2-gb5AgAAAPoFBff_AAAACAIBEv8AAAAM-_7xAQAAAPb4-wcAAAAAIAAtxonYOzgTQAlITlACKnMQABpgQQoA9u8fwOwVUNb5Fgbp4QHO0gy-Tf8-v__8zQFAD-i7wgwZ_xj0__yeAAAAJxCVKSAA8X8W6sIGAtHIpdjpFx90IQL2-jf04drYTtoFtdDFV0EdADvL5edO2wAOPdJKIAAttTMPOzgTQAlIb1ACKlMQARpAAAwBqRYEK_4EDgXsHAQi0xDXB_r1CAT2Axf_0SX3-fvy6SQCJREnEOMMAxr8GPYaCPnd7SAf8xr5BoEKHQri_iAALRKGizs4E0APSHFQAjAJOAFKAFIJCA8QkgIYADABYABoAA,,\"}","related_url":"http://www.youtube.com/watch?v=knRDczIQo8Q","parent-reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","related_vfp":1,"relatedVideo":"yes"}},"isPartner":false,"isOld":true,"docid":"33-0-6-ZF0F373BE9466479D","isVertical":false,"hasTranscription":false,"reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","dups":[{"nonStopSupported":true,"filmId":"17641075555900545918","duration":334,"origin":"http://www.youtube.com/watch?v=knRDczIQo8Q","title":{"url":"https://twitter.yandex.com.tr/video/preview/17641075555900545918?how=tm&text=Linux%2BAcademy","text":"How to use fping in kali \u0007[linux\u0007] - \u0007[Linux\u0007] \u0007[Academy\u0007]"},"clear_title":"How to use fping in kali linux - Linux Academy","green":{"url":"http://www.youtube.com/watch?v=knRDczIQo8Q","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x1a4c1be3f46/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2FknRDczIQo8Q%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/knRDczIQo8Q?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=knRDczIQo8Q","detailUrl":"https://twitter.yandex.com.tr/video/preview/17641075555900545918?how=tm&text=Linux%2BAcademy","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=knRDczIQo8Q","providerName":"YouTube","url":"http://www.youtube.com/watch?v=knRDczIQo8Q","thumb":{"online":false,"duration":"5:34","image":"//avatars.mds.yandex.net/get-vthumb/2924127/079ed4755c4f8d9564d024904908d5ba/564x318_1"},"views":3788,"time":"2018-01-31T00:00:00.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ==","name":"Linux Academy","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","verified":false,"interactive":true}}],"isTitleTranslated":false,"shouldUseMediaInstreamConfig":false,"contentTypeId":null,"nonStopSupported":true,"filmId":"17641075555900545918","duration":334,"origin":"http://www.youtube.com/watch?v=knRDczIQo8Q","title":{"url":"https://twitter.yandex.com.tr/video/preview/17641075555900545918?how=tm&text=Linux%2BAcademy","text":"How to use fping in kali \u0007[linux\u0007] - \u0007[Linux\u0007] \u0007[Academy\u0007]"},"clear_title":"How to use fping in kali linux - Linux Academy","green":{"url":"http://www.youtube.com/watch?v=knRDczIQo8Q","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x1a4c1be3f46/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2FknRDczIQo8Q%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/knRDczIQo8Q?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=knRDczIQo8Q","detailUrl":"https://twitter.yandex.com.tr/video/preview/17641075555900545918?how=tm&text=Linux%2BAcademy","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=knRDczIQo8Q","providerName":"YouTube","url":"http://www.youtube.com/watch?v=knRDczIQo8Q","thumb":{"online":false,"duration":"5:34","image":"//avatars.mds.yandex.net/get-vthumb/2924127/079ed4755c4f8d9564d024904908d5ba/564x318_1"},"views":3788,"time":"2018-01-31T00:00:00.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ==","name":"Linux Academy","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","verified":false,"interactive":true}},{"clear_description":"The program tests whether a certain IP address is in use on the local network and can obtain additional information about the device using that address.","description":"The program tests whether a certain IP address is in use on the local network and can obtain additional information about the device using that address.","videoWidth":854,"videoHeight":480,"isPorno":false,"online":false,"preview":{"url":"https://video-preview.s3.yandex.net/Z1atRwAAAAA.mp4","type":"video/mp4"},"extra":{"related":{"text":"How to use Arping in Kali linux - Linux Academy","related_orig_text":"Linux Academy","related_porno":false,"related_less_3m_off":true,"client":"d2d","no_cnt":1,"related_src":"serp","related":"{\"porno\":false,\"vfp\":1,\"orig_text\":\"Linux Academy\",\"url\":\"http:\\/\\/www.youtube.com\\/watch?v=skgQX-eYOqo\",\"src\":\"serp\",\"rvb\":\"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-AgAD9fsJBgn8Ah_7BvX1AwMA6Pr8_gT-AQAI-AMBCAEAAP0C-wYBAAAAAPQAAwD-AQAGAAz_BAAAAB798_r8AAAA-fv5AgABAAD2-gb5AgAAAPcFCv7_AAAABg8ADv4AAAAJ-u_1AQAAAPb9_gAAAAAAIAAtxonYOzgTQAlITlACKnMQABpgOQMACfwav9YSWdUMC_4K7BC87AbITf8iyP_s3gg4Bt61vg0a_x_5Cu6fAAAAOAyVEh8ACX8N6dEg9-jbruT2Hy5i_v3l2jD12t3jTuP7zM3VWCUtADeu7eFSyxIRU9w7IAAtYx8UOzgTQAlIb1ACKlMQARpABw0FrhECKPgECQLrFQchzxTcB_r2Bwf4Axf-1CP8-fj17x8CJhAhG94NAQj9GPYWAPvc8yET-hMAA4EHFgzk9SAALeAEkjs4E0APSHFQAjAJOAFKAFIJCA8QkgIYADABYABoAA,,\"}","related_url":"http://www.youtube.com/watch?v=skgQX-eYOqo","parent-reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","related_vfp":1,"relatedVideo":"yes"}},"isPartner":false,"isOld":true,"docid":"33-1-9-Z4AF2077D139E0DE2","isVertical":false,"hasTranscription":false,"reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","dups":[{"nonStopSupported":true,"filmId":"11715013640820955491","duration":235,"origin":"http://www.youtube.com/watch?v=skgQX-eYOqo","title":{"url":"https://twitter.yandex.com.tr/video/preview/11715013640820955491?how=tm&text=Linux%2BAcademy","text":"How to use Arping in Kali \u0007[linux\u0007] - \u0007[Linux\u0007] \u0007[Academy\u0007]"},"clear_title":"How to use Arping in Kali linux - Linux Academy","green":{"url":"http://www.youtube.com/watch?v=skgQX-eYOqo","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x1a4c1be3f46/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2FskgQX-eYOqo%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/skgQX-eYOqo?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=skgQX-eYOqo","detailUrl":"https://twitter.yandex.com.tr/video/preview/11715013640820955491?how=tm&text=Linux%2BAcademy","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=skgQX-eYOqo","providerName":"YouTube","url":"http://www.youtube.com/watch?v=skgQX-eYOqo","thumb":{"online":false,"duration":"3:55","image":"//avatars.mds.yandex.net/get-vthumb/3574485/6d031b9886ff683ce41a4d5c7ff4baa9/564x318_1"},"views":5726,"time":"2018-01-29T00:00:00.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ==","name":"Linux Academy","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","verified":false,"interactive":true}}],"isTitleTranslated":false,"shouldUseMediaInstreamConfig":false,"contentTypeId":null,"nonStopSupported":true,"filmId":"11715013640820955491","duration":235,"origin":"http://www.youtube.com/watch?v=skgQX-eYOqo","title":{"url":"https://twitter.yandex.com.tr/video/preview/11715013640820955491?how=tm&text=Linux%2BAcademy","text":"How to use Arping in Kali \u0007[linux\u0007] - \u0007[Linux\u0007] \u0007[Academy\u0007]"},"clear_title":"How to use Arping in Kali linux - Linux Academy","green":{"url":"http://www.youtube.com/watch?v=skgQX-eYOqo","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x1a4c1be3f46/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2FskgQX-eYOqo%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/skgQX-eYOqo?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=skgQX-eYOqo","detailUrl":"https://twitter.yandex.com.tr/video/preview/11715013640820955491?how=tm&text=Linux%2BAcademy","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=skgQX-eYOqo","providerName":"YouTube","url":"http://www.youtube.com/watch?v=skgQX-eYOqo","thumb":{"online":false,"duration":"3:55","image":"//avatars.mds.yandex.net/get-vthumb/3574485/6d031b9886ff683ce41a4d5c7ff4baa9/564x318_1"},"views":5726,"time":"2018-01-29T00:00:00.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ==","name":"Linux Academy","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","verified":false,"interactive":true}},{"clear_description":"Maltego offers the user unpublished information.. As such, Maltego can be tailored to your own requirements. Maltego is easy and fast to install - it uses Java, so it works on Windows, Mac and...","description":"Maltego offers the user unpublished information.. As such, Maltego can be tailored to your own requirements. Maltego is easy and fast to install - it uses Java, so it works on Windows, Mac and...","videoWidth":854,"videoHeight":480,"isPorno":false,"online":false,"preview":{"url":"https://video-preview.s3.yandex.net/fPlkEQAAAAA.mp4","type":"video/mp4"},"extra":{"related":{"text":"How to use Maltego to Gather Information for Penetration testing - Kali Linux","related_orig_text":"Linux Academy","related_porno":false,"related_less_3m_off":true,"client":"d2d","no_cnt":1,"related_src":"serp","related":"{\"porno\":false,\"vfp\":1,\"orig_text\":\"Linux Academy\",\"url\":\"http:\\/\\/www.youtube.com\\/watch?v=k_v06n7jkGg\",\"src\":\"serp\",\"rvb\":\"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_E98BggQkAYAEKyqLARABGniBDgwDAwAAAAQABQcBCPwCKAD7-_QFBQDsD_39-_8AAPH0_wECAAAACv33_AMAAAD8-AcM__4AAAnz9_MCAAAAEQDy9v0AAAABAfn6_wEAAPLz-PUCAAAADA4O9wAAAAAHDwAO_gAAAAb5__0AAAAAA_j-AwAAAAAgAC2EadM7OBNACUhOUAIqcxAAGmD99wA57AHP4xM2-AES_Pnl2wbXM8Yr_-zmABMYC-_lEuW78xb_U_kW97EAAAAn9N0h6AAJaN_C_Qz6BACyrOk0CH8LCRTGEgj21741HPLqI-IlHSUAHuTA7lvrvi4v_y8gAC1qdio7OBNACUhvUAIqUxABGkAEDgWsDAkp9QMDAewWDybMFNMB__oLBPoEFgHSJf79_PP5D_ovHCAa4Q4FB_MW9xID9tv1HxD1GvsIgQUWAeLzIAAt2Y6OOzgTQA9IcVACMAk4AUoAUgkIDxCSAhgAMAFgAGgA\"}","related_url":"http://www.youtube.com/watch?v=k_v06n7jkGg","parent-reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","related_vfp":1,"relatedVideo":"yes"}},"isPartner":false,"isOld":true,"docid":"33-9-8-Z29D358A49F445DB3","isVertical":false,"hasTranscription":false,"reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","dups":[{"nonStopSupported":true,"filmId":"261525992364842642","duration":223,"origin":"http://www.youtube.com/watch?v=k_v06n7jkGg","title":{"url":"https://twitter.yandex.com.tr/video/preview/261525992364842642?how=tm&text=Linux%2BAcademy","text":"How to use Maltego to Gather Information for Penetration testing - Kali \u0007[Linux\u0007]"},"clear_title":"How to use Maltego to Gather Information for Penetration testing - Kali Linux","green":{"url":"http://www.youtube.com/watch?v=k_v06n7jkGg","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x1a4c1be3f46/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2Fk_v06n7jkGg%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/k_v06n7jkGg?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=k_v06n7jkGg","detailUrl":"https://twitter.yandex.com.tr/video/preview/261525992364842642?how=tm&text=Linux%2BAcademy","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=k_v06n7jkGg","providerName":"YouTube","url":"http://www.youtube.com/watch?v=k_v06n7jkGg","thumb":{"online":false,"duration":"3:43","image":"//avatars.mds.yandex.net/get-vthumb/1781535/8e274c8e3642f855dc9a142fb36a0cd5/564x318_1"},"views":5009,"time":"2018-01-24T00:00:00.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ==","name":"Linux Academy","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","verified":false,"interactive":true}}],"isTitleTranslated":false,"shouldUseMediaInstreamConfig":false,"contentTypeId":null,"nonStopSupported":true,"filmId":"261525992364842642","duration":223,"origin":"http://www.youtube.com/watch?v=k_v06n7jkGg","title":{"url":"https://twitter.yandex.com.tr/video/preview/261525992364842642?how=tm&text=Linux%2BAcademy","text":"How to use Maltego to Gather Information for Penetration testing - Kali \u0007[Linux\u0007]"},"clear_title":"How to use Maltego to Gather Information for Penetration testing - Kali Linux","green":{"url":"http://www.youtube.com/watch?v=k_v06n7jkGg","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x1a4c1be3f46/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2Fk_v06n7jkGg%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/k_v06n7jkGg?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=k_v06n7jkGg","detailUrl":"https://twitter.yandex.com.tr/video/preview/261525992364842642?how=tm&text=Linux%2BAcademy","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=k_v06n7jkGg","providerName":"YouTube","url":"http://www.youtube.com/watch?v=k_v06n7jkGg","thumb":{"online":false,"duration":"3:43","image":"//avatars.mds.yandex.net/get-vthumb/1781535/8e274c8e3642f855dc9a142fb36a0cd5/564x318_1"},"views":5009,"time":"2018-01-24T00:00:00.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ==","name":"Linux Academy","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","verified":false,"interactive":true}},{"clear_description":"Goofile searches in areas defined on Google for certain types of files.","description":"Goofile searches in areas defined on Google for certain types of files.","videoWidth":854,"videoHeight":480,"isPorno":false,"online":false,"preview":{"url":"https://video-preview.s3.yandex.net/zAppTQAAAAA.mp4","type":"video/mp4"},"extra":{"related":{"text":"Penetration Testing using Kali Linux Dmitry & Goofile !","related_orig_text":"Linux Academy","related_porno":false,"related_less_3m_off":true,"client":"d2d","no_cnt":1,"related_src":"serp","related":"{\"porno\":false,\"vfp\":1,\"orig_text\":\"Linux Academy\",\"url\":\"http:\\/\\/www.youtube.com\\/watch?v=2h7XjZwS6xw\",\"src\":\"serp\",\"rvb\":\"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_QIP_QYC9wAAAO0K8AAFAAAA8_oIAgQAAAD6_wEGCAAAAPQFAwn7AAAAB_8C9QQAAAAe_fP6_AAAAP0B_gP-AQAA9uv0AwP_AAAF-gv8_wAAAPwDARAAAAAAFvb3-wEAAADu9_MBAP8AACAALYRp0zs4E0AJSE5QAipzEAAaYDT-ACPdLrjbIUvhECTSFtrz7gUR0TT_Esf_6fHoDhLtsNIAQf9JAhD_oQAAADUftDIEAO5_49nm7uzyy9Di6TktfhvnFuwf9dLG3FsKAbv2vDAtIgA_sOPdRwDSRl3rRSAALVUDEjs4E0AJSG9QAipTEAEaQAcHAKcMDCH1BQMJ6RYFG8oU3v8A-AEC_Acc-9Ek_vv3AOsmAyIMHhf2CA4i_BX3GvsE4fAhIfET9gSBAyAN4_wgAC0RtY47OBNAD0hxUAIwCTgBSgBgAGgA\"}","related_url":"http://www.youtube.com/watch?v=2h7XjZwS6xw","parent-reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","related_vfp":1,"relatedVideo":"yes"}},"isPartner":false,"isOld":true,"docid":"33-7-3-ZA3AA040595C5EBA4","isVertical":false,"hasTranscription":false,"reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","dups":[{"nonStopSupported":true,"filmId":"2729546201994991905","duration":204,"origin":"http://www.youtube.com/watch?v=2h7XjZwS6xw","title":{"url":"https://twitter.yandex.com.tr/video/preview/2729546201994991905?how=tm&text=Linux%2BAcademy","text":"Penetration Testing using Kali \u0007[Linux\u0007] Dmitry & Goofile !"},"clear_title":"Penetration Testing using Kali Linux Dmitry & Goofile !","green":{"url":"http://www.youtube.com/watch?v=2h7XjZwS6xw","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x1a4c1be3f46/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2F2h7XjZwS6xw%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/2h7XjZwS6xw?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=2h7XjZwS6xw","detailUrl":"https://twitter.yandex.com.tr/video/preview/2729546201994991905?how=tm&text=Linux%2BAcademy","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=2h7XjZwS6xw","providerName":"YouTube","url":"http://www.youtube.com/watch?v=2h7XjZwS6xw","thumb":{"online":false,"duration":"3:24","image":"//avatars.mds.yandex.net/get-vthumb/2847730/61bb84e6bcd04f3fd93070d3aad7bb44/564x318_1"},"views":151,"time":"2018-01-22T07:00:00.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ==","name":"Linux Academy","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","verified":false,"interactive":true}}],"isTitleTranslated":false,"shouldUseMediaInstreamConfig":false,"contentTypeId":null,"nonStopSupported":true,"filmId":"2729546201994991905","duration":204,"origin":"http://www.youtube.com/watch?v=2h7XjZwS6xw","title":{"url":"https://twitter.yandex.com.tr/video/preview/2729546201994991905?how=tm&text=Linux%2BAcademy","text":"Penetration Testing using Kali \u0007[Linux\u0007] Dmitry & Goofile !"},"clear_title":"Penetration Testing using Kali Linux Dmitry & Goofile !","green":{"url":"http://www.youtube.com/watch?v=2h7XjZwS6xw","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x1a4c1be3f46/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2F2h7XjZwS6xw%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/2h7XjZwS6xw?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=2h7XjZwS6xw","detailUrl":"https://twitter.yandex.com.tr/video/preview/2729546201994991905?how=tm&text=Linux%2BAcademy","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=2h7XjZwS6xw","providerName":"YouTube","url":"http://www.youtube.com/watch?v=2h7XjZwS6xw","thumb":{"online":false,"duration":"3:24","image":"//avatars.mds.yandex.net/get-vthumb/2847730/61bb84e6bcd04f3fd93070d3aad7bb44/564x318_1"},"views":151,"time":"2018-01-22T07:00:00.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ==","name":"Linux Academy","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","verified":false,"interactive":true}},{"clear_description":"See how to use Kali Linux for hacking in this 2017 tutorial including Kali Linux installation and basic Linux Command Line Interface (CLI). To begin, see how to get Kali Linux setup in a virtual...","description":"See how to use Kali \u0007[Linux\u0007] for hacking in this 2017 tutorial including Kali \u0007[Linux\u0007] installation and basic \u0007[Linux\u0007] Command Line Interface (CLI). To begin, see how to get Kali \u0007[Linux\u0007] setup in a virtual...","videoWidth":480,"videoHeight":360,"isPorno":false,"online":false,"preview":{"url":"https://video-preview.s3.yandex.net/tshyVQAAAAA.mp4","type":"video/mp4"},"extra":{"related":{"text":"Kali Linux - vid 20 - Howto use guymager Tool in Kali Linux - Linux Academy","related_orig_text":"Linux Academy","related_porno":false,"related_less_3m_off":true,"client":"d2d","no_cnt":1,"related_src":"serp","related":"{\"porno\":false,\"vfp\":1,\"orig_text\":\"Linux Academy\",\"url\":\"http:\\/\\/www.youtube.com\\/watch?v=fYjssPzS4wg\",\"src\":\"serp\",\"rvb\":\"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_gIAA_X7CQYJ_AIcAPz-9AMDAOj6_P4E_gEA-_P__QMAAAACAQT8CgAAAPXyAQUD_wAABvsC9vkAAAAWDPL5AAAAAP0B_wP-AQAA-QH5-AP_AAABCwn5_wAAAAoICggAAAAAC_H59gAAAAD8_QP8AAAAACAALcaJ2Ds4E0AJSE5QAipzEAAaYEz_ACLhLOb3HELq-ij3CNQD2swK00P_Os__8PcJIfL0uLv5C_8L7v3anQAAABwYiBwGACR_8eXcBuC9B9O_7zMIVPAtIbQ_GQHe5nX2_tDjAExDPgBV4KkAUurfDEvXGiAALV8wEjs4E0AJSG9QAipTEAEaQCMnDawJ-CzsBA396goIH80m0Qv29fwD8vcfCNQmCvH57_A18xUPFyjbEP_w9zn3CN_02gAhEvoLE_SBAR0L49MgAC2NZ4A7OBNAD0hxUAIwCTgBSgBSCQgPEJICGAAwAWAAaAA,\"}","related_url":"http://www.youtube.com/watch?v=fYjssPzS4wg","parent-reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","related_vfp":1,"relatedVideo":"yes"}},"isPartner":false,"isOld":true,"docid":"33-8-4-ZF43F929F88784C73","isVertical":false,"hasTranscription":false,"reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","dups":[{"nonStopSupported":true,"filmId":"9050553717903599692","duration":514,"origin":"http://www.youtube.com/watch?v=fYjssPzS4wg","title":{"url":"https://twitter.yandex.com.tr/video/preview/9050553717903599692?how=tm&text=Linux%2BAcademy","text":"Kali \u0007[Linux\u0007] - vid 20 - Howto use guymager Tool in Kali \u0007[Linux\u0007] - \u0007[Linux\u0007] \u0007[Academy\u0007]"},"clear_title":"Kali Linux - vid 20 - Howto use guymager Tool in Kali Linux - Linux Academy","green":{"url":"http://www.youtube.com/watch?v=fYjssPzS4wg","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x1a4c1be3f46/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2FfYjssPzS4wg%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/fYjssPzS4wg?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=fYjssPzS4wg","detailUrl":"https://twitter.yandex.com.tr/video/preview/9050553717903599692?how=tm&text=Linux%2BAcademy","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=fYjssPzS4wg","providerName":"YouTube","url":"http://www.youtube.com/watch?v=fYjssPzS4wg","thumb":{"online":false,"duration":"8:34","image":"//avatars.mds.yandex.net/get-vthumb/1527926/bdbb0afd45462ddf85f2b0e69482215b/564x318_1"},"views":4554,"time":"2017-09-09T06:53:03.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ==","name":"Linux Academy","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","verified":false,"interactive":true}}],"isTitleTranslated":false,"shouldUseMediaInstreamConfig":false,"contentTypeId":null,"nonStopSupported":true,"filmId":"9050553717903599692","duration":514,"origin":"http://www.youtube.com/watch?v=fYjssPzS4wg","title":{"url":"https://twitter.yandex.com.tr/video/preview/9050553717903599692?how=tm&text=Linux%2BAcademy","text":"Kali \u0007[Linux\u0007] - vid 20 - Howto use guymager Tool in Kali \u0007[Linux\u0007] - \u0007[Linux\u0007] \u0007[Academy\u0007]"},"clear_title":"Kali Linux - vid 20 - Howto use guymager Tool in Kali Linux - Linux Academy","green":{"url":"http://www.youtube.com/watch?v=fYjssPzS4wg","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x1a4c1be3f46/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2FfYjssPzS4wg%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/fYjssPzS4wg?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=fYjssPzS4wg","detailUrl":"https://twitter.yandex.com.tr/video/preview/9050553717903599692?how=tm&text=Linux%2BAcademy","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=fYjssPzS4wg","providerName":"YouTube","url":"http://www.youtube.com/watch?v=fYjssPzS4wg","thumb":{"online":false,"duration":"8:34","image":"//avatars.mds.yandex.net/get-vthumb/1527926/bdbb0afd45462ddf85f2b0e69482215b/564x318_1"},"views":4554,"time":"2017-09-09T06:53:03.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ==","name":"Linux Academy","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","verified":false,"interactive":true}},{"clear_description":"See how to use Kali Linux for hacking in this 2017 tutorial including Kali Linux installation and basic Linux Command Line Interface (CLI). To begin, see how to get Kali Linux setup in a virtual...","description":"See how to use Kali \u0007[Linux\u0007] for hacking in this 2017 tutorial including Kali \u0007[Linux\u0007] installation and basic \u0007[Linux\u0007] Command Line Interface (CLI). To begin, see how to get Kali \u0007[Linux\u0007] setup in a virtual...","videoWidth":640,"videoHeight":480,"isPorno":false,"online":false,"preview":{"url":"https://video-preview.s3.yandex.net/U65lQwEAAAA.mp4","type":"video/mp4"},"extra":{"related":{"text":"Kali Linux - vid 14 - What Are Forensic Images in Kali Linux - Linux Academy","related_orig_text":"Linux Academy","related_porno":false,"related_less_3m_off":true,"client":"d2d","no_cnt":1,"related_src":"serp","related":"{\"porno\":false,\"vfp\":1,\"orig_text\":\"Linux Academy\",\"url\":\"http:\\/\\/www.youtube.com\\/watch?v=OWv-Pj2xeZc\",\"src\":\"serp\",\"rvb\":\"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-AgAD9fsJBgn8AhT9_QD2AQEA6Pr8_gT-AQD49gQADAAAAPr_AQYIAAAA9fIBBQP_AAAIAg7yBAAAABcE_P0DAAAA-fv5AgABAAD2-gb5AgAAAAELCfn_AAAAAwYCBwAAAAD-9vjuAAAAAPb9_gAAAAAAIAAtxonYOzgTQAlITlACKnMQABpgUwMAJwMl3MwqTukPH-sX--vcvQfvMv8R2P_IBhQjCv7SyvMo_xLtEg-hAAAAL_-FBP4AG3_e9uAC4K3l35_zKOFj6wY6sRQj_MLXS-wNvuwdRkE2ADHCwRtI-fn_TtwoIAAtFkUUOzgTQAlIb1ACKlMQARpAEhMNoxD9KfEDDRLqBxslxzDC_-77AQEEDRgI0CoL7gzc9Ef2GQQIMsMGCPMHGPUD2QC7AQkS5xAV94HoF-3g0iAALeFgbDs4E0APSHFQAjAJOAFKAGAAaAA,\"}","related_url":"http://www.youtube.com/watch?v=OWv-Pj2xeZc","parent-reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","related_vfp":1,"relatedVideo":"yes"}},"isPartner":false,"isOld":true,"docid":"33-4-17-ZDCA57EAD7B757013","isVertical":false,"hasTranscription":false,"reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","dups":[{"nonStopSupported":true,"filmId":"13099425756234424865","duration":849,"origin":"http://www.youtube.com/watch?v=OWv-Pj2xeZc","title":{"url":"https://twitter.yandex.com.tr/video/preview/13099425756234424865?how=tm&text=Linux%2BAcademy","text":"Kali \u0007[Linux\u0007] - vid 14 - What Are Forensic Images in Kali \u0007[Linux\u0007] - \u0007[Linux\u0007] \u0007[Academy\u0007]"},"clear_title":"Kali Linux - vid 14 - What Are Forensic Images in Kali Linux - Linux Academy","green":{"url":"http://www.youtube.com/watch?v=OWv-Pj2xeZc","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x1a4c1be3f46/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2FOWv-Pj2xeZc%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/OWv-Pj2xeZc?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=OWv-Pj2xeZc","detailUrl":"https://twitter.yandex.com.tr/video/preview/13099425756234424865?how=tm&text=Linux%2BAcademy","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=OWv-Pj2xeZc","providerName":"YouTube","url":"http://www.youtube.com/watch?v=OWv-Pj2xeZc","thumb":{"online":false,"duration":"14:09","image":"//avatars.mds.yandex.net/get-vthumb/2855970/888f909b8eac6306fb2b39c7ea30ece6/564x318_1"},"views":1476,"time":"2017-09-09T06:53:02.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ==","name":"Linux Academy","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","verified":false,"interactive":true}}],"isTitleTranslated":false,"shouldUseMediaInstreamConfig":false,"contentTypeId":null,"nonStopSupported":true,"filmId":"13099425756234424865","duration":849,"origin":"http://www.youtube.com/watch?v=OWv-Pj2xeZc","title":{"url":"https://twitter.yandex.com.tr/video/preview/13099425756234424865?how=tm&text=Linux%2BAcademy","text":"Kali \u0007[Linux\u0007] - vid 14 - What Are Forensic Images in Kali \u0007[Linux\u0007] - \u0007[Linux\u0007] \u0007[Academy\u0007]"},"clear_title":"Kali Linux - vid 14 - What Are Forensic Images in Kali Linux - Linux Academy","green":{"url":"http://www.youtube.com/watch?v=OWv-Pj2xeZc","text":"YouTube","hostname":"youtube.com"},"player":{"baseUrl":"//yastatic.net/video-player/0x1a4c1be3f46/pages-common/youtube/youtube.html","hash":"html=%3Ciframe%20src%3D%22%2F%2Fwww.youtube.com%2Fembed%2FOWv-Pj2xeZc%3Fenablejsapi%3D1%26amp%3Bwmode%3Dopaque%22%20frameborder%3D%220%22%20scrolling%3D%22no%22%20allowfullscreen%3D%221%22%20allow%3D%22autoplay%3B%20fullscreen%3B%20accelerometer%3B%20gyroscope%3B%20picture-in-picture%22%20aria-label%3D%22Video%22%3E%3C%2Fiframe%3E&smart_ap=1"},"playerId":"youtube","isQuasar":true,"playerUri":"\u003ciframe src=\"//www.youtube.com/embed/OWv-Pj2xeZc?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","isExternal":false,"visibleURL":"http://www.youtube.com/watch?v=OWv-Pj2xeZc","detailUrl":"https://twitter.yandex.com.tr/video/preview/13099425756234424865?how=tm&text=Linux%2BAcademy","clipHost":"www.youtube.com","clipHref":"http://www.youtube.com/watch?v=OWv-Pj2xeZc","providerName":"YouTube","url":"http://www.youtube.com/watch?v=OWv-Pj2xeZc","thumb":{"online":false,"duration":"14:09","image":"//avatars.mds.yandex.net/get-vthumb/2855970/888f909b8eac6306fb2b39c7ea30ece6/564x318_1"},"views":1476,"time":"2017-09-09T06:53:02.000Z","faviconHost":"http://youtube.com","isAvod":false,"canBuySubscription":false,"rknWarning":false,"hasTranslation":true,"channel":{"id":"d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ==","name":"Linux Academy","url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","verified":false,"interactive":true}}]},"page":0},"prevention":{},"hasNextPage":true,"rightSerpItems":[{"type":"direct","id":"search-list-right","props":{"advRsyaActivateParams":{"pcodeParams":{"blockId":"R-I-8843654-1","renderTo":"search-list-right-0-R-I-8843654-1","pageNumber":0,"grab":"dExpbnV4IEFjYWRlbXkK","darkTheme":false,"lazyLoad":false,"extParams":{"reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","ui":"desktop","yuid":"3259059651725852523"}}},"isAdult":false,"position":0,"placement":"search-list-right"},"curPage":0}],"quasarData":{"title":""},"isAdultQuery":false,"errorList":[],"layout":"list"},"main":{"_isInitial":true,"snippets":[],"serpFooter":{"linksGroups":[]}},"feed":{"_isInitial":true,"snippets":[],"nextPageLoadStatus":"initial","paginationRequest":"","shouldRemountPrevPlayer":false}},"internal":{"nonce":"0872457290259059657322","expFlags":{"video_instream_player_yaru_loader":1,"video_skeleton_doc_update":1,"velocity_delay_drawer":1,"video_instream_disable_hosts":"dzen.ru,ok.ru,vk.com,video.mail.ru","video_search_toggle_with_text":1,"video_single_vh_unmute":1,"video_update_d2d_after_clickout":1,"video_adv_serp_list_right":1,"velocity_disable_suspense":1,"dark_theme_desktop":"cookie","video_instream_player_config":{"vmapScenarioId":8,"category":1,"impId":6,"partnerId":2216089,"title":"Kali Linux - vid 14 - What Are Forensic Images in Kali Linux - Linux Academy"},"video_font_yandex_sans":1,"video_resource_loader":1,"video_skeleton_direct_under_player_update":1,"video_vh_player_js":0,"video_dzc":1,"video_masthead_ratio":"180,4","video_searchdata_scheme":1,"video_single_vh_iframe":1,"velocity_delay_metrika":1,"video_partner_label":1,"video_direct_render_in_viewport":1,"velocity_video_track_css_cache_hit":1,"video_skeleton_instream_update":1,"video_resource_loader_load_timeout":6000,"video_viewer_catch_sandbox_early_inits":1,"mmui_extended_escape_scheme":"searchdata.clips.0.authorname","spok":"id","video_search_grid_direct_repeat":6,"video_direct_config_desktop_search":"search-grid-row:R-I-48058-718:R-I-474674-109,search-grid-head:R-I-2120168-7","init_meta":{"ask-user-purchase-history":1,"use-src-videoquickp":1,"enable-begemot":1,"begemot-enable-cancelled-misspell":1,"enable_masthead":1,"use-src-videop":1,"use-src-videoquickp_misspell":1,"enable_blackbox_multisession":1,"begemot-enable-cancelled-misspell-rtmr":1,"enable_video_iron_fetcher":1,"use-related-only":1,"ask-yandex-io-devices":1,"use-images-device-setup":1,"use-src-imagesp":1,"images-apphost-collections-front":1,"enable_aab_apphost":1,"graph-is-video-search":1,"use-src-imagesp_misspell":1,"use-src-imagesultrap":1,"use-video-apphost-pre-templates":1,"use-src-videop_misspell":1,"use-video-apphost-post-templates":1,"use-src-imagesquickp":1,"enable_video_carousels":"1","restrict-max-docs":"1000","use-images-region-setup":1,"use-post-auto2":1,"use-images-settings-setup":1,"use-src-ugc_favorites":1,"video_vitrina_disable":"0","use-images-user-setup":1,"use-video-pre-search-data":1,"begemot-no-suggest-history":1},"video_skeleton_direct_organic_update":1,"video_blender":1,"video_search_grid_enable":0,"video_search_grid_direct_start":3,"video_instream_players_yaru_enable":1,"video_redirect_plug":2,"video_disable_serp_dzc":1,"video_direct_pos_id":"R-I-48058-73","dark_theme_desktop_default_pref":"system","video_search_toggle_enable":1,"video_viewer_desktop_blocks":1,"velocity_split_hydration":4,"video_duration_counter_new_format":1,"video_thumb_poster_full":1,"video_scrollpages":2,"video_serp_desktop_block_design":1,"velocity_video_inline_css":3,"video_direct_pos":5,"video_direct_viewport_margin_desktop":700},"slots":["1057333,0,66;1092869,0,78;82358,0,41;1089854,0,95;928405,0,57;1103533,0,71;1099715,0,56;1058431,0,99;1083708,0,88;1084780,0,4;1106431,0,48;1095527,0,87;1099396,0,14;1091888,0,17;1105522,0,7;1106104,0,15;936723,0,96;1106421,0,56;66185,0,42;1101493,0,71;1100593,0,69;1092132,0,2;1095066,0,11;1103327,0,91;1106634,0,14;1104715,0,4;1098376,0,7;477965,0,16;1021600,0,66;260563,0,49;1048609,0,20;88928,0,47;1102939,0,46;1102568,0,32;263461,0,36;255406,0,36;1105823,0,76;30278,0,66;1102550,0,23;1104589,0,80;1105476,0,30;1101987,0,97;124080,0,93;856305,0,43;151171,0,39;126344,0,8;287509,0,67;1103277,0,49;784778,0,28;1051464,0,15"],"isYandexNet":false,"platform":"desktop","isEnLogo":true,"retpath":"https%3A%2F%2Ftwitter.yandex.com.tr%2Fvideo%2Fsearch%3FchannelId%3Dd3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%253D%253D%26how%3Dtm%26text%3DLinux%2BAcademy","mordaUrl":"//yandex.com.tr/","videoSearchUrl":"https://twitter.yandex.com.tr/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","settingsUrl":"https://yandex.com.tr/tune/search/","helpUrl":"https://yandex.com.tr/support/video/","legalUrl":"//legal.yandex.com.tr/termsofuse/","feedbackUrl":"https://yandex.com.tr/support/video/troubleshooting.html","basename":"/video","currentPageName":"search","isYandexApp":false,"isYandexAppAndroid":false,"isYandexAppIos":false,"isAndroid":false,"isHamster":false,"serpid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","backUrl":"//ya.ru","url":"https://twitter.yandex.com.tr/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","isIntegrationTest":false,"shouldDropLogs":false,"seo":{"title":"Linux Academy: 44 video Yandex'te bulundu","description":"\"Linux Academy\" sorgusu için arama sonuçları Yandex'te","shareTitle":"Linux Academy — Yandex video arama","keywords":"yandex video, video araması, çevrimiçi izle, dizi, film, müzik klipleri","hasPorno":0},"isEmbedded":false,"isPumpkin":false,"quasarCsrfToken":"y23c1a6bd7b37baf4e886e313af4ba685","reportFeedbackBaseProps":{"initEmail":"","metaFields":{"userAgent":"Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebot@anthropic.com)","userTestids":"191768,223386,238743,246500,257621,253288,265553,270072,277807,274239,294077,278842,299121,313103,331010,338398,378416,359879,415420,644350,652605,645301,679708,689693,690449,696466,696473,722746,740796,769020,776165,777765,771230,781521,790415,801982,851450,878348,886706,883477,900639,931367,937268,969063,935488,945314,989988,982463,991363,990185,1015567,1011895,1035320,1033956,1035241,1036046,1068593,1087297,1089355,1060131,1076329,1099741,1103590,1092869,82358,1089854,1091888,1105522,1106104,66185,260563,88928,263461,30278,1104589,124080","yandexuid":"3259059651725852523","uid":"0","queryText":"Linux Academy","reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL"}},"userTestids":"191768,223386,238743,246500,257621,253288,265553,270072,277807,274239,294077,278842,299121,313103,331010,338398,378416,359879,415420,644350,652605,645301,679708,689693,690449,696466,696473,722746,740796,769020,776165,777765,771230,781521,790415,801982,851450,878348,886706,883477,900639,931367,937268,969063,935488,945314,989988,982463,991363,990185,1015567,1011895,1035320,1033956,1035241,1036046,1068593,1087297,1089355,1060131,1076329,1099741,1103590,1092869,82358,1089854,1091888,1105522,1106104,66185,260563,88928,263461,30278,1104589,124080","regionId":20815,"isYaRu":false,"shouldUnmountSearchPageInViewer":false,"videoGlobalContext":{"platform":"desktop","isPumpkin":false,"language":"tr","user_time":{"epoch":"1725852523","tz":"America/Louisville","to_iso":"2024-09-08T23:28:43-0400","__is_plain":1},"isQuasarEnabled":false,"isHermione":false,"shouldStubImages":false,"enableVideoPreviewInHermione":false,"reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","isEmbedded":false,"shouldDailyClickoutDzenInSerp":false,"shouldDailyClickoutDzenInViewer":true,"shouldDisableWebp":false,"removeLinkPrefix":"/video","shouldUseHighresPreview":true,"shouldCutSnippetTitle":true,"shouldShowPlusBadge":true,"reportFeedbackBaseProps":{"initEmail":"","metaFields":{"userAgent":"Mozilla/5.0 AppleWebKit/537.36 (KHTML, like Gecko; compatible; ClaudeBot/1.0; +claudebot@anthropic.com)","userTestids":"191768,223386,238743,246500,257621,253288,265553,270072,277807,274239,294077,278842,299121,313103,331010,338398,378416,359879,415420,644350,652605,645301,679708,689693,690449,696466,696473,722746,740796,769020,776165,777765,771230,781521,790415,801982,851450,878348,886706,883477,900639,931367,937268,969063,935488,945314,989988,982463,991363,990185,1015567,1011895,1035320,1033956,1035241,1036046,1068593,1087297,1089355,1060131,1076329,1099741,1103590,1092869,82358,1089854,1091888,1105522,1106104,66185,260563,88928,263461,30278,1104589,124080","yandexuid":"3259059651725852523","uid":"0","queryText":"Linux Academy","reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL"}},"deviceDetect":{"OSFamily":"Unknown","isTV":0,"x64":0,"GoogleToolBarVersion":"","MultiTouch":0,"BrowserBase":"","YandexBarVersion":"","isTablet":0,"YandexBar":0,"isTouch":0,"isMobile":0,"DeviceKeyboard":"","device":"desktop","historySupport":0,"BrowserShellVersion":"","DeviceVendor":"","isBrowser":1,"hasFlash":0,"MailRuSputnikVersion":"","isSameSiteSupported":0,"BrowserBaseVersion":"","BrowserVersionRaw":"","DeviceId":"","error":"","MailRuAgent":0,"ScreenWidth":0,"inAppBrowser":0,"hasHTML5":0,"isEmulator":0,"J2ME":0,"MailRuAgentVersion":"","BrowserEngineVersionRaw":"537.36","isRobot":0,"__is_plain":1,"BrowserEngineVersion":"0537.0036","BrowserName":"","DeviceModel":"","BrowserEngine":"WebKit","DeviceName":"","OSVersionRaw":"","OSName":"","GoogleToolBar":0,"ScreenSize":"","MailRuSputnik":0,"YaBuildName":"","PreferMobile":0,"DesktopMode":0,"isWAP":0,"BrowserVersion":"","BitsPerPixel":0,"BrowserShell":"","YaGUI":"","isBeta":0,"OSVersion":"","ScreenHeight":0},"nonce":"0872457290259059657322"},"viewer":{"videoId":"","isHermione":false}},"user":{"tld":"com.tr","isEuDomain":false,"login":"","passportId":"","isLoggedIn":false,"locationName":"Columbus","isFamily":false,"yandexuid":"3259059651725852523","ugcCsrfToken":"","family":1,"isChild":false},"config":{"skinMode":"system","skin":"light","version":"releases/frontend/video/v1.1427.0#06346d083b72eb46a6ed547c676f40b04b3c2afe","isGridSupported":false,"advConfig":{},"advExpConfig":{}},"counters":{"params":{"useBeacon":false,"clickHost":"twitter.yandex.com.tr/clck","pid":197},"dict":{"serp":"471","pager":"405","down":"601","up":"600","footer":"295","more":"75","page":"143","loaded":"1007","grid":"3223","support":"2458","client":"2989","layout":"54","list":"436","fallback":"2010","duration":"2136","within":"3247","on":"10","off":"11","host":"3052","init":"1309","supported":"3761","video":"231","translation":"347","distrib":"316","onboarding":"2045","shown":"3780","filters":"618","hide":"1656","lang":"1144","link":"513","click":"882","advanced":"255","open":"842","close":"486","apply":"2461","reset":"3236","short":"142","toggle":"237","snippet":"254","item":"22","icon":"1167","abuse":"1436","submit":"297","wizard":"358","incut":"1073","summary":"3410","keypoint":"4086","title":"82","scroll":"768","direct":"155","p4":"89","show":"487","p11":"96","p0":"85","feedback":"296","region":"287","help":"177","settings":"1137","recommendations":"2671","home":"1319","soo":"65","youtube":"624","google":"66","bing":"568"}},"clips":{"items":{"15973141694887446067":{"videoId":"15973141694887446067","docid":"33-5-1-ZC613FBEE55E2DDCA","preview":{"posterSrc":"//avatars.mds.yandex.net/get-vthumb/3632549/c71cbb630d5a229133dfde260f232b1b/564x318_1","videoSrc":"https://video-preview.s3.yandex.net/XcpRGwAAAAA.mp4","videoType":"video/mp4"},"target":"_self","position":"0","reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","isAdultDoc":false,"cwidth":640,"cheight":360,"cratio":1.77777,"dups":["15973141694887446067"]},"10445789023534140390":{"videoId":"10445789023534140390","docid":"33-11-0-Z49933130E2A8E9A1","preview":{"posterSrc":"//avatars.mds.yandex.net/get-vthumb/2837109/875453c8796fbe408631c6f3a44ef223/564x318_1","videoSrc":"https://video-preview.s3.yandex.net/h4r0nQAAAAA.mp4","videoType":"video/mp4"},"target":"_self","position":"1","reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","isAdultDoc":false,"cwidth":640,"cheight":360,"cratio":1.77777,"dups":["10445789023534140390"]},"14865280675538328129":{"videoId":"14865280675538328129","docid":"33-7-3-Z59BE9A4A96AE9834","preview":{"posterSrc":"//avatars.mds.yandex.net/get-vthumb/3324888/5038d61477bc9cf646685a16dec84e67/564x318_1","videoSrc":"https://video-preview.s3.yandex.net/8c0PYgAAAAA.mp4","videoType":"video/mp4"},"target":"_self","position":"2","reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","isAdultDoc":false,"cwidth":854,"cheight":480,"cratio":1.77916,"dups":["14865280675538328129"]},"11706762062859956463":{"videoId":"11706762062859956463","docid":"33-2-3-ZA7238E18C39F0807","preview":{"posterSrc":"//avatars.mds.yandex.net/get-vthumb/906125/1e8c020313caa1cd0887c694e9312290/564x318_1","videoSrc":"https://video-preview.s3.yandex.net/EAMgFQAAAAA.mp4","videoType":"video/mp4"},"target":"_self","position":"3","reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","isAdultDoc":false,"cwidth":854,"cheight":480,"cratio":1.77916,"dups":["11706762062859956463"]},"13588841270886561389":{"videoId":"13588841270886561389","docid":"33-9-11-Z0D0D0E8A3055FB0A","preview":{"posterSrc":"//avatars.mds.yandex.net/get-vthumb/4099577/c09a01ef4d790f046e14313ec70f679e/564x318_1","videoSrc":"https://video-preview.s3.yandex.net/RO7PNAAAAAA.mp4","videoType":"video/mp4"},"target":"_self","position":"5","reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","isAdultDoc":false,"cwidth":640,"cheight":360,"cratio":1.77777,"dups":["13588841270886561389"]},"15474213565329913965":{"videoId":"15474213565329913965","docid":"33-2-9-Z0EEFD17F1DA21135","preview":{"posterSrc":"//avatars.mds.yandex.net/get-vthumb/3744479/95c7b63dcb9a1ca51e8c47996034a9e7/564x318_1","videoSrc":"https://video-preview.s3.yandex.net/AG_blQAAAAA.mp4","videoType":"video/mp4"},"target":"_self","position":"6","reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","isAdultDoc":false,"cwidth":854,"cheight":480,"cratio":1.77916,"dups":["15474213565329913965"]},"17646817791513898132":{"videoId":"17646817791513898132","docid":"33-10-16-Z2665ACEE9ADE7F8A","preview":{"posterSrc":"//avatars.mds.yandex.net/get-vthumb/1347329/6b99c11c8e9d45f3dd4cccd78741b96c/564x318_1","videoSrc":"https://video-preview.s3.yandex.net/GpwGQwIAAAA.mp4","videoType":"video/mp4"},"target":"_self","position":"7","reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","isAdultDoc":false,"cwidth":854,"cheight":480,"cratio":1.77916,"dups":["7677755737145296716"]},"675832350034190167":{"videoId":"675832350034190167","docid":"33-0-7-Z21C97A50C768E6F2","preview":{"posterSrc":"//avatars.mds.yandex.net/get-vthumb/2225548/dcb236309f1f80b0a83f1cf73cf58d86/564x318_1"},"target":"_self","position":"8","reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","isAdultDoc":false,"cwidth":1290,"cheight":1080,"cratio":1.19444,"dups":["5466599671689468807"]},"9782130221093995089":{"videoId":"9782130221093995089","docid":"33-5-15-ZB232C766EF859189","preview":{"posterSrc":"//avatars.mds.yandex.net/get-vthumb/3906919/88f89ef52733db6ba1363e1e6ee29588/564x318_1","videoSrc":"https://video-preview.s3.yandex.net/zIS7MAAAAAA.mp4","videoType":"video/mp4"},"target":"_self","position":"9","reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","isAdultDoc":false,"cwidth":854,"cheight":480,"cratio":1.77916,"dups":["9782130221093995089"]},"16909835499892697883":{"videoId":"16909835499892697883","docid":"33-10-15-Z0B898723C694966B","preview":{"posterSrc":"//avatars.mds.yandex.net/get-vthumb/3272903/d9cb64f3e074b3d4230b7943a3333e5e/564x318_1","videoSrc":"https://video-preview.s3.yandex.net/7q3QjgAAAAA.mp4","videoType":"video/mp4"},"target":"_self","position":"10","reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","isAdultDoc":false,"cwidth":854,"cheight":480,"cratio":1.77916,"dups":["16909835499892697883"]},"433682869455237169":{"videoId":"433682869455237169","docid":"33-8-1-Z8B4CDF8760850CC6","preview":{"posterSrc":"//avatars.mds.yandex.net/get-vthumb/1791085/860d35509c219a4f03fc0ceb8a160146/564x318_1","videoSrc":"https://video-preview.s3.yandex.net/kPuXhgAAAAA.mp4","videoType":"video/mp4"},"target":"_self","position":"12","reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","isAdultDoc":false,"cwidth":854,"cheight":480,"cratio":1.77916,"dups":["433682869455237169"]},"9920158304544978019":{"videoId":"9920158304544978019","docid":"33-2-7-Z96EDBDBC9AB6187C","preview":{"posterSrc":"//avatars.mds.yandex.net/get-vthumb/3725379/3475f97794f79af704c49b937e509152/564x318_1","videoSrc":"https://video-preview.s3.yandex.net/5JDOFAAAAAA.mp4","videoType":"video/mp4"},"target":"_self","position":"13","reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","isAdultDoc":false,"cwidth":854,"cheight":480,"cratio":1.77916,"dups":["9920158304544978019"]},"17641075555900545918":{"videoId":"17641075555900545918","docid":"33-0-6-ZF0F373BE9466479D","preview":{"posterSrc":"//avatars.mds.yandex.net/get-vthumb/2924127/079ed4755c4f8d9564d024904908d5ba/564x318_1","videoSrc":"https://video-preview.s3.yandex.net/a1LtRwAAAAA.mp4","videoType":"video/mp4"},"target":"_self","position":"14","reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","isAdultDoc":false,"cwidth":854,"cheight":480,"cratio":1.77916,"dups":["17641075555900545918"]},"11715013640820955491":{"videoId":"11715013640820955491","docid":"33-1-9-Z4AF2077D139E0DE2","preview":{"posterSrc":"//avatars.mds.yandex.net/get-vthumb/3574485/6d031b9886ff683ce41a4d5c7ff4baa9/564x318_1","videoSrc":"https://video-preview.s3.yandex.net/Z1atRwAAAAA.mp4","videoType":"video/mp4"},"target":"_self","position":"15","reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","isAdultDoc":false,"cwidth":854,"cheight":480,"cratio":1.77916,"dups":["11715013640820955491"]},"261525992364842642":{"videoId":"261525992364842642","docid":"33-9-8-Z29D358A49F445DB3","preview":{"posterSrc":"//avatars.mds.yandex.net/get-vthumb/1781535/8e274c8e3642f855dc9a142fb36a0cd5/564x318_1","videoSrc":"https://video-preview.s3.yandex.net/fPlkEQAAAAA.mp4","videoType":"video/mp4"},"target":"_self","position":"16","reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","isAdultDoc":false,"cwidth":854,"cheight":480,"cratio":1.77916,"dups":["261525992364842642"]},"2729546201994991905":{"videoId":"2729546201994991905","docid":"33-7-3-ZA3AA040595C5EBA4","preview":{"posterSrc":"//avatars.mds.yandex.net/get-vthumb/2847730/61bb84e6bcd04f3fd93070d3aad7bb44/564x318_1","videoSrc":"https://video-preview.s3.yandex.net/zAppTQAAAAA.mp4","videoType":"video/mp4"},"target":"_self","position":"17","reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","isAdultDoc":false,"cwidth":854,"cheight":480,"cratio":1.77916,"dups":["2729546201994991905"]},"9050553717903599692":{"videoId":"9050553717903599692","docid":"33-8-4-ZF43F929F88784C73","preview":{"posterSrc":"//avatars.mds.yandex.net/get-vthumb/1527926/bdbb0afd45462ddf85f2b0e69482215b/564x318_1","videoSrc":"https://video-preview.s3.yandex.net/tshyVQAAAAA.mp4","videoType":"video/mp4"},"target":"_self","position":"18","reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","isAdultDoc":false,"cwidth":480,"cheight":360,"cratio":1.33333,"dups":["9050553717903599692"]},"13099425756234424865":{"videoId":"13099425756234424865","docid":"33-4-17-ZDCA57EAD7B757013","preview":{"posterSrc":"//avatars.mds.yandex.net/get-vthumb/2855970/888f909b8eac6306fb2b39c7ea30ece6/564x318_1","videoSrc":"https://video-preview.s3.yandex.net/U65lQwEAAAA.mp4","videoType":"video/mp4"},"target":"_self","position":"19","reqid":"1725852523015385-12087245729025905965-balancer-l7leveler-kubr-yp-klg-322-BAL","isAdultDoc":false,"cwidth":640,"cheight":480,"cratio":1.33333,"dups":["13099425756234424865"]}},"dups":{"15973141694887446067":{"videoId":"15973141694887446067","title":"how to find exploits using exploit database in kali \u0007[linux\u0007] \u0007[Linux\u0007] \u0007[academy\u0007]","cleanTitle":"how to find exploits using exploit database in kali linux Linux academy","host":{"title":"YouTube","href":"http://www.youtube.com/watch?v=fMXBX0qnklo","playerUri":"\u003ciframe src=\"//www.youtube.com/embed/fMXBX0qnklo?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","playerId":"youtube","providerName":"youtube.com","sourceHost":"www.youtube.com","name":"youtube.com","secondPart":{"type":"CHANNEL","id":"d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ==","name":"Linux Academy","isVerified":false,"url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","origUrl":"http://www.youtube.com/channel/UCVuQ9czy6XTPfy9trpK8fPA","a11yText":"Linux Academy. "},"faviconUrl":"//favicon.yandex.net/favicon/v2/http%3A%2F%2Fyoutube.com?color=255%2C255%2C255%2C0&size=32&stub=1"},"duration":{"value":356,"text":"5:56","a11yText":"Длительность 5 минут 56 секунд"},"views":{"text":"4,4K","shouldShowInSnippet":true,"a11yText":"4,4 тысяч просмотров"},"date":"28 Şub 2018","modifyTime":1519776000000,"isExternal":false,"shouldShowQuasar":false,"parentClipId":"15973141694887446067","href":"/preview/15973141694887446067?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy"},"10445789023534140390":{"videoId":"10445789023534140390","title":"How to Exploit A Single Vulnerability with Metasploit Pro - \u0007[Linux\u0007] \u0007[Academy\u0007]","cleanTitle":"How to Exploit A Single Vulnerability with Metasploit Pro - Linux Academy","host":{"title":"YouTube","href":"http://www.youtube.com/watch?v=S_Rc7NMNag8","playerUri":"\u003ciframe src=\"//www.youtube.com/embed/S_Rc7NMNag8?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","playerId":"youtube","providerName":"youtube.com","sourceHost":"www.youtube.com","name":"youtube.com","secondPart":{"type":"CHANNEL","id":"d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ==","name":"Linux Academy","isVerified":false,"url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","origUrl":"https://www.youtube.com/channel/UCVuQ9czy6XTPfy9trpK8fPA","a11yText":"Linux Academy. "},"faviconUrl":"//favicon.yandex.net/favicon/v2/http%3A%2F%2Fyoutube.com?color=255%2C255%2C255%2C0&size=32&stub=1"},"duration":{"value":320,"text":"5:20","a11yText":"Длительность 5 минут 20 секунд"},"views":{"text":"7,4K","shouldShowInSnippet":true,"a11yText":"7,4 тысяч просмотров"},"date":"27 Şub 2018","modifyTime":1519682403000,"isExternal":false,"shouldShowQuasar":false,"parentClipId":"10445789023534140390","href":"/preview/10445789023534140390?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy"},"14865280675538328129":{"videoId":"14865280675538328129","title":"How to Find Vulnerability with Metasploit - \u0007[Linux\u0007] \u0007[Academy\u0007]","cleanTitle":"How to Find Vulnerability with Metasploit - Linux Academy","host":{"title":"YouTube","href":"http://www.youtube.com/watch?v=X0vlSYhfU-I","playerUri":"\u003ciframe src=\"//www.youtube.com/embed/X0vlSYhfU-I?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","playerId":"youtube","providerName":"youtube.com","sourceHost":"www.youtube.com","name":"youtube.com","secondPart":{"type":"CHANNEL","id":"d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ==","name":"Linux Academy","isVerified":false,"url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","origUrl":"https://www.youtube.com/channel/UCVuQ9czy6XTPfy9trpK8fPA","a11yText":"Linux Academy. "},"faviconUrl":"//favicon.yandex.net/favicon/v2/http%3A%2F%2Fyoutube.com?color=255%2C255%2C255%2C0&size=32&stub=1"},"duration":{"value":312,"text":"5:12","a11yText":"Длительность 5 минут 12 секунд"},"views":{"text":"7,1K","shouldShowInSnippet":true,"a11yText":"7,1 тысяч просмотров"},"date":"24 Şub 2018","modifyTime":1519423202000,"isExternal":false,"shouldShowQuasar":false,"parentClipId":"14865280675538328129","href":"/preview/14865280675538328129?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy"},"11706762062859956463":{"videoId":"11706762062859956463","title":"How to scan target systems for vulnerability with metasploit in kali \u0007[linux\u0007] \u0007[Linux\u0007] \u0007[academy\u0007]","cleanTitle":"How to scan target systems for vulnerability with metasploit in kali linux Linux academy","host":{"title":"YouTube","href":"http://www.youtube.com/watch?v=cDt-L2-13Ec","playerUri":"\u003ciframe src=\"//www.youtube.com/embed/cDt-L2-13Ec?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","playerId":"youtube","providerName":"youtube.com","sourceHost":"www.youtube.com","name":"youtube.com","secondPart":{"type":"CHANNEL","id":"d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ==","name":"Linux Academy","isVerified":false,"url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","origUrl":"https://www.youtube.com/channel/UCVuQ9czy6XTPfy9trpK8fPA","a11yText":"Linux Academy. "},"faviconUrl":"//favicon.yandex.net/favicon/v2/http%3A%2F%2Fyoutube.com?color=255%2C255%2C255%2C0&size=32&stub=1"},"duration":{"value":219,"text":"3:39","a11yText":"Длительность 3 минуты 39 секунд"},"views":{"text":"11,3K","shouldShowInSnippet":true,"a11yText":"11,3 тысяч просмотров"},"date":"21 Şub 2018","modifyTime":1519171200000,"isExternal":false,"shouldShowQuasar":false,"parentClipId":"11706762062859956463","href":"/preview/11706762062859956463?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy"},"13588841270886561389":{"videoId":"13588841270886561389","title":"How to install Metasploit Rapid7 Pro in kali \u0007[linux\u0007] \u0007[Linux\u0007] \u0007[academy\u0007]","cleanTitle":"How to install Metasploit Rapid7 Pro in kali linux Linux academy","host":{"title":"YouTube","href":"http://www.youtube.com/watch?v=qefv6LRGFQ4","playerUri":"\u003ciframe src=\"//www.youtube.com/embed/qefv6LRGFQ4?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","playerId":"youtube","providerName":"youtube.com","sourceHost":"www.youtube.com","name":"youtube.com","secondPart":{"type":"CHANNEL","id":"d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ==","name":"Linux Academy","isVerified":false,"url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","origUrl":"https://www.youtube.com/channel/UCVuQ9czy6XTPfy9trpK8fPA","a11yText":"Linux Academy. "},"faviconUrl":"//favicon.yandex.net/favicon/v2/http%3A%2F%2Fyoutube.com?color=255%2C255%2C255%2C0&size=32&stub=1"},"duration":{"value":155,"text":"2:35","a11yText":"Длительность 2 минуты 35 секунд"},"views":{"text":"3K","shouldShowInSnippet":true,"a11yText":"3 тысячи просмотров"},"date":"19 Şub 2018","modifyTime":1518998400000,"isExternal":false,"shouldShowQuasar":false,"parentClipId":"13588841270886561389","href":"/preview/13588841270886561389?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy"},"15474213565329913965":{"videoId":"15474213565329913965","title":"How to Read Nessus Scan Report - \u0007[Linux\u0007] \u0007[Academy\u0007]","cleanTitle":"How to Read Nessus Scan Report - Linux Academy","host":{"title":"YouTube","href":"http://www.youtube.com/watch?v=1_WbqiLSwzU","playerUri":"\u003ciframe src=\"//www.youtube.com/embed/1_WbqiLSwzU?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","playerId":"youtube","providerName":"youtube.com","sourceHost":"www.youtube.com","name":"youtube.com","secondPart":{"type":"CHANNEL","id":"d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ==","name":"Linux Academy","isVerified":false,"url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","origUrl":"https://www.youtube.com/channel/UCVuQ9czy6XTPfy9trpK8fPA","a11yText":"Linux Academy. "},"faviconUrl":"//favicon.yandex.net/favicon/v2/http%3A%2F%2Fyoutube.com?color=255%2C255%2C255%2C0&size=32&stub=1"},"duration":{"value":261,"text":"4:21","a11yText":"Длительность 4 минуты 21 секунда"},"views":{"text":"4,6K","shouldShowInSnippet":true,"a11yText":"4,6 тысяч просмотров"},"date":"16 Şub 2018","modifyTime":1518813000000,"isExternal":false,"shouldShowQuasar":false,"parentClipId":"15474213565329913965","href":"/preview/15474213565329913965?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy"},"7677755737145296716":{"videoId":"7677755737145296716","title":"How to use Nessus in kali linux - Linux academy","cleanTitle":"How to use Nessus in kali linux - Linux academy","host":{"title":"YouTube","href":"http://www.youtube.com/watch?v=JRbT97YfTuI","playerUri":"\u003ciframe src=\"//www.youtube.com/embed/JRbT97YfTuI?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","playerId":"youtube","providerName":"youtube.com","sourceHost":"www.youtube.com","name":"youtube.com","secondPart":{"type":"CHANNEL","isVerified":false,"a11yText":""},"faviconUrl":"//favicon.yandex.net/favicon/v2/http%3A%2F%2Fyoutube.com?color=255%2C255%2C255%2C0&size=32&stub=1"},"duration":{"value":270,"text":"4:30","a11yText":"Длительность 4 минуты 30 секунд"},"date":"12 Şub 2018","modifyTime":1518467400000,"isExternal":false,"shouldShowQuasar":false,"parentClipId":"17646817791513898132","href":"/preview/7677755737145296716?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy"},"5466599671689468807":{"videoId":"5466599671689468807","title":"Kali Linux - vid 8 - Downloading Kali Linux - Linux Academy","cleanTitle":"Kali Linux - vid 8 - Downloading Kali Linux - Linux Academy","host":{"title":"YouTube","href":"http://www.youtube.com/watch?v=tB8xdcdULR0","playerUri":"\u003ciframe src=\"//www.youtube.com/embed/tB8xdcdULR0?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","playerId":"youtube","providerName":"youtube.com","sourceHost":"www.youtube.com","name":"youtube.com","secondPart":{"type":"CHANNEL","isVerified":false,"a11yText":""},"faviconUrl":"//favicon.yandex.net/favicon/v2/http%3A%2F%2Fyoutube.com?color=255%2C255%2C255%2C0&size=32&stub=1"},"duration":{"value":458,"text":"7:38","a11yText":"Длительность 7 минут 38 секунд"},"date":"8 Eyl 2017","modifyTime":1504828800000,"isExternal":false,"shouldShowQuasar":false,"parentClipId":"675832350034190167","href":"/preview/5466599671689468807?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy"},"9782130221093995089":{"videoId":"9782130221093995089","title":"How to Install and Use Nessus Vulnerability Scanner - \u0007[Linux\u0007] \u0007[Academy\u0007]","cleanTitle":"How to Install and Use Nessus Vulnerability Scanner - Linux Academy","host":{"title":"YouTube","href":"http://www.youtube.com/watch?v=oFvVB_PIfbw","playerUri":"\u003ciframe src=\"//www.youtube.com/embed/oFvVB_PIfbw?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","playerId":"youtube","providerName":"youtube.com","sourceHost":"www.youtube.com","name":"youtube.com","secondPart":{"type":"CHANNEL","id":"d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ==","name":"Linux Academy","isVerified":false,"url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","origUrl":"http://www.youtube.com/@linuxacademy7706","a11yText":"Linux Academy. "},"faviconUrl":"//favicon.yandex.net/favicon/v2/http%3A%2F%2Fyoutube.com?color=255%2C255%2C255%2C0&size=32&stub=1"},"duration":{"value":307,"text":"5:07","a11yText":"Длительность 5 минут 7 секунд"},"views":{"text":"1,4K","shouldShowInSnippet":true,"a11yText":"1,4 тысяч просмотров"},"date":"9 Şub 2018","modifyTime":1518134400000,"isExternal":false,"shouldShowQuasar":false,"parentClipId":"9782130221093995089","href":"/preview/9782130221093995089?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy"},"16909835499892697883":{"videoId":"16909835499892697883","title":"How to use burp Suite to brute force - \u0007[Linux\u0007] \u0007[Academy\u0007]","cleanTitle":"How to use burp Suite to brute force - Linux Academy","host":{"title":"YouTube","href":"http://www.youtube.com/watch?v=I3MpD_aeBVA","playerUri":"\u003ciframe src=\"//www.youtube.com/embed/I3MpD_aeBVA?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","playerId":"youtube","providerName":"youtube.com","sourceHost":"www.youtube.com","name":"youtube.com","secondPart":{"type":"CHANNEL","id":"d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ==","name":"Linux Academy","isVerified":false,"url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","origUrl":"http://www.youtube.com/@linuxacademy7706","a11yText":"Linux Academy. "},"faviconUrl":"//favicon.yandex.net/favicon/v2/http%3A%2F%2Fyoutube.com?color=255%2C255%2C255%2C0&size=32&stub=1"},"duration":{"value":347,"text":"5:47","a11yText":"Длительность 5 минут 47 секунд"},"date":"7 Şub 2018","modifyTime":1517961600000,"isExternal":false,"shouldShowQuasar":false,"parentClipId":"16909835499892697883","href":"/preview/16909835499892697883?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy"},"433682869455237169":{"videoId":"433682869455237169","title":"How to setup etterap on kali \u0007[linux\u0007] - \u0007[Linux\u0007] \u0007[Academy\u0007]","cleanTitle":"How to setup etterap on kali linux - Linux Academy","host":{"title":"YouTube","href":"http://www.youtube.com/watch?v=FYsVbm8SPow","playerUri":"\u003ciframe src=\"//www.youtube.com/embed/FYsVbm8SPow?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","playerId":"youtube","providerName":"youtube.com","sourceHost":"www.youtube.com","name":"youtube.com","secondPart":{"type":"CHANNEL","id":"d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ==","name":"Linux Academy","isVerified":false,"url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","origUrl":"https://www.youtube.com/channel/UCVuQ9czy6XTPfy9trpK8fPA","a11yText":"Linux Academy. "},"faviconUrl":"//favicon.yandex.net/favicon/v2/http%3A%2F%2Fyoutube.com?color=255%2C255%2C255%2C0&size=32&stub=1"},"duration":{"value":278,"text":"4:38","a11yText":"Длительность 4 минуты 38 секунд"},"date":"5 Şub 2018","modifyTime":1517814000000,"isExternal":false,"shouldShowQuasar":false,"parentClipId":"433682869455237169","href":"/preview/433682869455237169?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy"},"9920158304544978019":{"videoId":"9920158304544978019","title":"Scapy Network discovery tool Tutorial for beginners","cleanTitle":"Scapy Network discovery tool Tutorial for beginners","host":{"title":"YouTube","href":"http://www.youtube.com/watch?v=dwqiQkZFoAU","playerUri":"\u003ciframe src=\"//www.youtube.com/embed/dwqiQkZFoAU?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","playerId":"youtube","providerName":"youtube.com","sourceHost":"www.youtube.com","name":"youtube.com","secondPart":{"type":"CHANNEL","id":"d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ==","name":"Linux Academy","isVerified":false,"url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","origUrl":"https://www.youtube.com/channel/UCVuQ9czy6XTPfy9trpK8fPA","a11yText":"Linux Academy. "},"faviconUrl":"//favicon.yandex.net/favicon/v2/http%3A%2F%2Fyoutube.com?color=255%2C255%2C255%2C0&size=32&stub=1"},"duration":{"value":296,"text":"4:56","a11yText":"Длительность 4 минуты 56 секунд"},"views":{"text":"1,3K","shouldShowInSnippet":true,"a11yText":"1,3 тысяч просмотров"},"date":"2 Şub 2018","modifyTime":1517529600000,"isExternal":false,"shouldShowQuasar":false,"parentClipId":"9920158304544978019","href":"/preview/9920158304544978019?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy"},"17641075555900545918":{"videoId":"17641075555900545918","title":"How to use fping in kali \u0007[linux\u0007] - \u0007[Linux\u0007] \u0007[Academy\u0007]","cleanTitle":"How to use fping in kali linux - Linux Academy","host":{"title":"YouTube","href":"http://www.youtube.com/watch?v=knRDczIQo8Q","playerUri":"\u003ciframe src=\"//www.youtube.com/embed/knRDczIQo8Q?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","playerId":"youtube","providerName":"youtube.com","sourceHost":"www.youtube.com","name":"youtube.com","secondPart":{"type":"CHANNEL","id":"d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ==","name":"Linux Academy","isVerified":false,"url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","origUrl":"https://www.youtube.com/channel/UCVuQ9czy6XTPfy9trpK8fPA","a11yText":"Linux Academy. "},"faviconUrl":"//favicon.yandex.net/favicon/v2/http%3A%2F%2Fyoutube.com?color=255%2C255%2C255%2C0&size=32&stub=1"},"duration":{"value":334,"text":"5:34","a11yText":"Длительность 5 минут 34 секунды"},"views":{"text":"3,8K","shouldShowInSnippet":true,"a11yText":"3,8 тысяч просмотров"},"date":"31 Oca 2018","modifyTime":1517356800000,"isExternal":false,"shouldShowQuasar":false,"parentClipId":"17641075555900545918","href":"/preview/17641075555900545918?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy"},"11715013640820955491":{"videoId":"11715013640820955491","title":"How to use Arping in Kali \u0007[linux\u0007] - \u0007[Linux\u0007] \u0007[Academy\u0007]","cleanTitle":"How to use Arping in Kali linux - Linux Academy","host":{"title":"YouTube","href":"http://www.youtube.com/watch?v=skgQX-eYOqo","playerUri":"\u003ciframe src=\"//www.youtube.com/embed/skgQX-eYOqo?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","playerId":"youtube","providerName":"youtube.com","sourceHost":"www.youtube.com","name":"youtube.com","secondPart":{"type":"CHANNEL","id":"d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ==","name":"Linux Academy","isVerified":false,"url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","origUrl":"https://www.youtube.com/channel/UCVuQ9czy6XTPfy9trpK8fPA","a11yText":"Linux Academy. "},"faviconUrl":"//favicon.yandex.net/favicon/v2/http%3A%2F%2Fyoutube.com?color=255%2C255%2C255%2C0&size=32&stub=1"},"duration":{"value":235,"text":"3:55","a11yText":"Длительность 3 минуты 55 секунд"},"views":{"text":"5,7K","shouldShowInSnippet":true,"a11yText":"5,7 тысяч просмотров"},"date":"29 Oca 2018","modifyTime":1517184000000,"isExternal":false,"shouldShowQuasar":false,"parentClipId":"11715013640820955491","href":"/preview/11715013640820955491?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy"},"261525992364842642":{"videoId":"261525992364842642","title":"How to use Maltego to Gather Information for Penetration testing - Kali \u0007[Linux\u0007]","cleanTitle":"How to use Maltego to Gather Information for Penetration testing - Kali Linux","host":{"title":"YouTube","href":"http://www.youtube.com/watch?v=k_v06n7jkGg","playerUri":"\u003ciframe src=\"//www.youtube.com/embed/k_v06n7jkGg?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","playerId":"youtube","providerName":"youtube.com","sourceHost":"www.youtube.com","name":"youtube.com","secondPart":{"type":"CHANNEL","id":"d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ==","name":"Linux Academy","isVerified":false,"url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","origUrl":"http://www.youtube.com/channel/UCVuQ9czy6XTPfy9trpK8fPA","a11yText":"Linux Academy. "},"faviconUrl":"//favicon.yandex.net/favicon/v2/http%3A%2F%2Fyoutube.com?color=255%2C255%2C255%2C0&size=32&stub=1"},"duration":{"value":223,"text":"3:43","a11yText":"Длительность 3 минуты 43 секунды"},"views":{"text":"5K","shouldShowInSnippet":true,"a11yText":"5 тысяч просмотров"},"date":"24 Oca 2018","modifyTime":1516752000000,"isExternal":false,"shouldShowQuasar":false,"parentClipId":"261525992364842642","href":"/preview/261525992364842642?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy"},"2729546201994991905":{"videoId":"2729546201994991905","title":"Penetration Testing using Kali \u0007[Linux\u0007] Dmitry & Goofile !","cleanTitle":"Penetration Testing using Kali Linux Dmitry & Goofile !","host":{"title":"YouTube","href":"http://www.youtube.com/watch?v=2h7XjZwS6xw","playerUri":"\u003ciframe src=\"//www.youtube.com/embed/2h7XjZwS6xw?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","playerId":"youtube","providerName":"youtube.com","sourceHost":"www.youtube.com","name":"youtube.com","secondPart":{"type":"CHANNEL","id":"d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ==","name":"Linux Academy","isVerified":false,"url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","origUrl":"http://www.youtube.com/channel/UCVuQ9czy6XTPfy9trpK8fPA","a11yText":"Linux Academy. "},"faviconUrl":"//favicon.yandex.net/favicon/v2/http%3A%2F%2Fyoutube.com?color=255%2C255%2C255%2C0&size=32&stub=1"},"duration":{"value":204,"text":"3:24","a11yText":"Длительность 3 минуты 24 секунды"},"date":"22 Oca 2018","modifyTime":1516604400000,"isExternal":false,"shouldShowQuasar":false,"parentClipId":"2729546201994991905","href":"/preview/2729546201994991905?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy"},"9050553717903599692":{"videoId":"9050553717903599692","title":"Kali \u0007[Linux\u0007] - vid 20 - Howto use guymager Tool in Kali \u0007[Linux\u0007] - \u0007[Linux\u0007] \u0007[Academy\u0007]","cleanTitle":"Kali Linux - vid 20 - Howto use guymager Tool in Kali Linux - Linux Academy","host":{"title":"YouTube","href":"http://www.youtube.com/watch?v=fYjssPzS4wg","playerUri":"\u003ciframe src=\"//www.youtube.com/embed/fYjssPzS4wg?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","playerId":"youtube","providerName":"youtube.com","sourceHost":"www.youtube.com","name":"youtube.com","secondPart":{"type":"CHANNEL","id":"d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ==","name":"Linux Academy","isVerified":false,"url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","origUrl":"http://www.youtube.com/@linuxacademy7706","a11yText":"Linux Academy. "},"faviconUrl":"//favicon.yandex.net/favicon/v2/http%3A%2F%2Fyoutube.com?color=255%2C255%2C255%2C0&size=32&stub=1"},"duration":{"value":514,"text":"8:34","a11yText":"Длительность 8 минут 34 секунды"},"views":{"text":"4,6K","shouldShowInSnippet":true,"a11yText":"4,6 тысяч просмотров"},"date":"9 Eyl 2017","modifyTime":1504939983000,"isExternal":false,"shouldShowQuasar":false,"parentClipId":"9050553717903599692","href":"/preview/9050553717903599692?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy"},"13099425756234424865":{"videoId":"13099425756234424865","title":"Kali \u0007[Linux\u0007] - vid 14 - What Are Forensic Images in Kali \u0007[Linux\u0007] - \u0007[Linux\u0007] \u0007[Academy\u0007]","cleanTitle":"Kali Linux - vid 14 - What Are Forensic Images in Kali Linux - Linux Academy","host":{"title":"YouTube","href":"http://www.youtube.com/watch?v=OWv-Pj2xeZc","playerUri":"\u003ciframe src=\"//www.youtube.com/embed/OWv-Pj2xeZc?enablejsapi=1&wmode=opaque\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"1\" allow=\"autoplay; fullscreen; accelerometer; gyroscope; picture-in-picture\" aria-label=\"Video\">\u003c/iframe>","playerId":"youtube","providerName":"youtube.com","sourceHost":"www.youtube.com","name":"youtube.com","secondPart":{"type":"CHANNEL","id":"d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ==","name":"Linux Academy","isVerified":false,"url":"/video/search?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy","origUrl":"http://www.youtube.com/@linuxacademy7706","a11yText":"Linux Academy. "},"faviconUrl":"//favicon.yandex.net/favicon/v2/http%3A%2F%2Fyoutube.com?color=255%2C255%2C255%2C0&size=32&stub=1"},"duration":{"value":849,"text":"14:09","a11yText":"Длительность 14 минут 9 секунд"},"views":{"text":"1,5K","shouldShowInSnippet":true,"a11yText":"1,5 тысяч просмотров"},"date":"9 Eyl 2017","modifyTime":1504939982000,"isExternal":false,"shouldShowQuasar":false,"parentClipId":"13099425756234424865","href":"/preview/13099425756234424865?channelId=d3d3LnlvdXR1YmUuY29tO1VDVnVROWN6eTZYVFBmeTl0cnBLOGZQQQ%3D%3D&how=tm&text=Linux+Academy"}}},"related":{"items":[],"loadingStatus":"None","nextPageNum":0,"ncrnd":0},"playbackQueue":{"currentIndex":0,"items":[]}}