Something I've seen before, and is talked about in a DefCon talk, is people will setup a proxy on say,something like your VPS in the example, and capture the traffic between the user and the server that's going through the proxy. Some people are able to not only perform MITM attacks, butThey could also MITB (Man In The Browser); which can present even more major security riskschoose to inject JavaScript or return false data to you if they so desired.
For an attacker to sniff all of the traffic going to a web server, they would need to have remote access to it, and have the ability to sniffor the network andit's on for the very least. They'd also need to be able to transfer the collected data to themselves. Hackers willI've heard of hackers commonly useusing VPSs to hide their identity whenever they've cracked into a web server and attempting to perform such attacks. This might be where you've got this from.
As for the resources that would be required; A packet sniffer such as wireshark would work. Also an exploit for a vulnerability on the web server would be needed as well.