Dummy, you could Metasploit them, DDoS them, Nmap them (Pretty much what metasploit does automatically) and lots of other things.