Ethical Hacking War Stories: Zero Trust, IAM & Advanced C2 Tactics