Offensive Use of IDS – This paper explores ways Intrusion Detection Systems (IDS) can be used for offensive purposes. It gives a brief technical outline of determining which TCP services are running on a network using passive monitoring.
You can download it from the following link: https://packetstormsecurity.com/files/download/22210/OffensiveUseofIDS.pdf
Source: https://packetstormsecurity.com/files/22210/OffensiveUseofIDS.pdf.html