Documents on NSA software published by Edward Snowden created a stir, but did not allow seeing how it actually worked. That came possible after the Shadow Brokers’ leakage was published. We were not idling during that period and attempted to replicate that work through our independent research. In this report, we will deeply analyze the leaked JETPLOW and compare it against our own results. We will also think about how this situation and such backdoors can be developed further on, and how things stand with other equipment from Cisco. In the last part we will show methods for detecting such backdoors.