Due to the popularity of using the technology, network security plays a crucial role recently which supports to establish strong systems that work against cyberattacks. Furthermore, the term "network vulnerabilities" refers to the flaws in the network which attackers exploit to break security and steal critical data. To discover the weaknesses of the network, the attackers use the mechanism of open port scanning to reach the systems and data, therefore the administrator should configure the network correctly and close any open ports. Monitoring network traffic is very important, so the developer focus to design analyzing tools that employ to inspect transmitted packets over the network to trace anomalous activities. Wireshark is one of the most well-known packets analyzing tool that is used to monitor the packets as well as used for examining the protocols. Moreover, the type of attack can be determined from the statistic report which generated by Wireshark tool. For instance, if the attacker sends syn packets to a target device, Wireshark will show the detail of syn packets. Practically, when tcp syn requests are flooded to any device, there will be a huge impact on the device's resources like consuming the bandwidth which affects system performance at the end. This paper presents a penetration test to lunch syn flood attack by sending a huge number of syn packets from Kali Linux machine to three targeted machines which are Windows 8.1, Windows 10 and Metasploitable. The test includes three scenarios, the first one focus on flooding syn packets by using the real source ip address of the attacker machine while the second scenario relays on sending syn packets by utilizing a spoof source ip address. The final scenario depends on using a random source ip address to flood syn packets. The Wireshark tool will be run in Kali machine to capture the packets and generate detailed reports. The results of captured data will be recorded to make analysis and list the capabilities of this tool.