{"href":"https://api.simplecast.com/oembed?url=https%3A%2F%2Fsecuritytools.simplecast.com%2Fepisodes%2F6e31706c-6e31706c","width":444,"version":"1.0","type":"rich","title":"IoT Pen Tester Ken Munro: Probing Wireless Networks (Part 2)","thumbnail_width":300,"thumbnail_url":"https://image.simplecastcdn.com/images/5128d4/5128d4b9-97a3-46af-af2a-d5ffe821f6e2/e4ef05f7-21ac-4a72-989a-4dd5a1f835ef/1491251956artwork.jpg","thumbnail_height":300,"provider_url":"https://simplecast.com","provider_name":"Simplecast","html":"<iframe src=\"https://player.simplecast.com/e4ef05f7-21ac-4a72-989a-4dd5a1f835ef\" height=\"200\" width=\"100%\" title=\"IoT Pen Tester Ken Munro: Probing Wireless Networks (Part 2)\" frameborder=\"0\" scrolling=\"no\"></iframe>","height":200,"description":"We have more Ken Munro in this second part of our podcast.  In this segment, Ken tells us how he probes wireless networks for weaknesses and some of the tools he uses."}