What's better than walking out the front door? Description: Cover, in detail methods of egress for post-exploitation, deployment of "call back" and establishing a persistent SSL listening port on exploited host. Also covered will be methods of egress with using non-standard USB switchblade techniques.