Would you exactly indicate what you want to do with your victim's computer? Do you want to get an access to it, view private information or what? If you find some ports opened and they are used by applications that contain vulnerabilities (bugs), then you are able to use some exploits in order to hack into this computer.