... server translates the information returned by the Sentinels into CycL and adds it to the KB This approach is potentially vulnerable to an attack on the Sentinels themselves, or to spoofing of their ... 95/98/NT/2000/XP, Linux RedHat and Solaris The Attack Planner enables the user to state plan goals, launch the planner and view the attack plans generated For example, a user can state the goal “An external ... that gathers information about the software, hardware and status of the machine it is running on The server polls the Sentinels, gathers network information from them, and then represents that...