{"version":"1.0","provider_name":"DICC ","provider_url":"https:\/\/dicc.in\/blog","author_name":"DICC Institute","author_url":"https:\/\/dicc.in\/blog\/author\/diccmohsin\/","title":"How to learn Ethical Hacking from the basics - DICC","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"OXDI5jth2E\"><a href=\"https:\/\/dicc.in\/blog\/how-to-learn-ethical-hacking-from-the-basics\/\">How to learn Ethical Hacking from the basics<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/dicc.in\/blog\/how-to-learn-ethical-hacking-from-the-basics\/embed\/#?secret=OXDI5jth2E\" width=\"600\" height=\"338\" title=\"&#8220;How to learn Ethical Hacking from the basics&#8221; &#8212; DICC \" data-secret=\"OXDI5jth2E\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/dicc.in\/blog\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/dicc.in\/blog\/wp-content\/uploads\/2020\/05\/ethical-hacking-min.jpg","thumbnail_width":866,"thumbnail_height":487,"description":"The field of hacking is been around us for the last five decades and it would be not wrong if I say that the domain is of great importance in every other field that holds something in this new era. The security related to every piece of information is of broad discipline. All this covers [&hellip;]"}