Hackers often employ traditional IT reconnaissance and exploitation tactics to compromise web-based HMIs ... and server topology that lie behind the HMI, attackers will use this to pivot to ...