Breaking Attack Paths to Legacy and OT Systems