Using a Compromised Router to Capture Network Traffic - This document details the approach, methodology and results of a recent experiment using GRE tunnels to sniff all traffic passing through a Cisco router.
cde9ed24f2abf6cc7625477e61b850179dd4e9a0d79c528f6d47e6637dddad12