Traditional techniques for C2 channels, exfiltration and exploitation are often frustrated by the growing sophistication and prevalence of security protections, monitoring solutions, and controls. Whilst all is definitely not lost from an attacker's perspective - we constantly see examples of attackers creatively bypassing such protections - it is always beneficial to have more weapons in one's arsenal, particularly when coming up against heavily-defended networks and highly-secured environments. This talk presents and demonstrates a number of techniques and attacks which utilise light and/or sound, covering everything from C2 channels and exfiltration using light and near-ultrasonic sounds, to disabling and disrupting motion detectors; from a DIY laser microphone to sending a drone into the stratosphere; from trolling friends, to jamming speech, and demotivating malware analysts. This talk not only provides attendees with a new suite of techniques and methodologies to consider when coming up against a well-defended target, particularly for on-site engagements, but also demonstrates - in a hopefully fun and practical way - how these techniques work, their pros and cons, and possible future developments. I also consider mitigation against some of these attacks, where applicable, and encourage defenders to consider how and why some of these attacks might work where traditional methods fail.