the person will have a port open that is vulnerable to attack. Then you should use a proxy so you don't get caught, then use the open port to your advantage, however you can.