Offensive Use of IDS - This paper explores ways Intrusion Detection Systems (IDS) can be used for offensive purposes. It gives a brief technical outline of determining which TCP services are running on a network using passive monitoring.
5afe13e0d8a24ba3581c61da0bde82429b9bc4336ab887010dcf199a7ad71979