>>656
You can either attempt to exploit a service that their computer is running, or you can attempt to social engineer them into downloading a malicious file that gives you access.
For the first consider looking up nmap and metasploit (assuming that you will be unable to make your own exploits)
for the second you can look into pre-built trojan viruses that come with simple builders
I am assuming you have no background in this field