Wednesday, 3 October 2012

How to Unblock or Hack Cyberoam to Access the Blocked Sites

Recently our university has uploaded the Cyberoam client on the university server and we cannot access 50% sites through this whatever the site we want to open it says 'The web site you are trying to access is blocked under university's ITS Policy'. I am giving you all the detailed and 100% working Hack for Cyberoam and how to unblock any site in college as most of the colleges have Cyberoam installed.

Cyberoam is all-inclusive UTM solution offers a well-coordinated defense through tightly integrated best-of-breed security solutions over a single interface -Stateful inspection firewall, VPN, gateway anti-virus, gateway anti-spam, gateway anti-malware, intrusion prevention system (IPS), content filtering, bandwidth management (QoS), multiple link management and enhanced user-based reporting.
That means it maintains records "Who is Doing What" ?

First of all I will inform you all that Cyberoam is highly secured internet client and it blocks all the types of proxies like HTTP, CGI, Socks(4/5), Ftp, highanonimity ... in short all.

There are a few ways to fool the firewall :- 

1. As you all know that every programmer leaves at least One Loop Hole in its programming or software design. Why I am saying this is because Cyberoam has also left this Loop Hole in its design. Now what is this Loop Hole ?

Its HTTPS Loop HOLE...


Https are SSL secured HTTP clients and these are most secured sites on the network, that's why Cyberoam leaves it.

Now the main Point to access the blocked sites you have to use the Https based proxies.

Most of Https based proxies are paid so to search on net for free Https based proxies is a waste of time. I am providing you the one such free proxy service to access blocked sites on the Cyberoam. So feel free to surf any site in your college the best thing is that this site will not allow Cyberoam admin to track you.
Click on the above Link and surf Freely any site in your college. You need to accept the certificate provided by the site to use it as your web browser show the certificate accept statement.

2. Another way would be to use a PROXY software. The best free PROXY software that work in the Cyberoam network are : -

a. Tor Browser Bundle : This used to work wonderfully. This prevents anyone from learning your location or browsing habits. This is for web browsers, instant messaging clients, remote logins, and more. It works in our university currently. To download the Tor Browser Bundle Click Here.

b. Ultrasurf : This one is an good proxy. It can easily bypass the Cyberoam firewall if the connection is good otherwise it doesn't connect or keeps disconnecting. It doesn't work in our university now. I think its worth a try.

c. Hotspot Shield : Hotspot Shield protects you online and lets you access the information you need. Access blocked services like Facebook, YouTube, Twitter, and Skype in countries or venues where the Internet is censored. Keep hackers from stealing personal information while users are browsing the Internet in public locations like Starbucks. Hotspot Shield also protects against 3.5 million malware threats, including infected websites, phishing and spam sites. Browse the Internet privately and anonymously. Hotspot Shield does all of this without collecting any information on your personal identity.

d. : This is an awesome proxy server developed to save traffic. This is 100% Java based and therefore this service can be used on any platform with an installed Java Runtime Environment, including mobile phones.

I will show you the steps to use :-

Step 1 : Download Software.

Step 2 : Run It only runs if you have Java Runtime Environment installed on your system.

Step 3 : Now run your web browser go to Tools > Internet Options > Connections > LAN Settings (for Internet Explorer) and enter the address & the port 8080 then press OK.

Step 4 : Enjoy !

3. Another cool way to fool the system is to use a VPN software like Hamachi. Find someone who would be willing to share a network connection with you, then connect through Hamachi and use the net uninterrupted. You could even setup a server at your own home and connect to your own computer. Institutes normally require VPN services so they NEVER block VPN ports.

4. One more way is little complicated and requires two different software and manual configurations but ultimately at the end you get the freedom !! Freedom to be unmonitored !!!

Step 1 : Download Free Port Scanner Software.

Step 2 : Install Free Port Scanner on your system.

Step 3 : Detect the static IP assigned to your organisation.

Step 4 : Scan open ports for your static IP address.

Step 5 : Download Proxifier.

Step 6 : Install proxifier software.

Step 7 : Configure proxifier software with the static IP & the open port (generally 3128) for it.

above process in pics

How to get going??
Phase 1 : Detecting external IP and open ports
The first software required to crack software is a free port scanner software. For your convenience i have upload it online and you can download from
Download now !
Step 2 : Install free port scanner
Once you have downloaded the free port scanner , you have install it on your system. The installation is typical to any other software installation on windows. You can follow the screenshots for smooth installation.
A. Double click on setup file and initialize the installation.
B. Choose the directory (destination location) where the software has to be installed
C. Select the start menu folderbypass_cyberoam_03
D. Choose whether you want to create desktop icon and quick launch icon (optional)
E. Ready to install !
F. Completion of installation and launching the application.
Step 3 : Detecting the static IP assigned to your organization.
We need to find out the static IP assigned to your organization which is allocated by the ISP. Here the mechanism of hacking cyberoam is the route the packets directly to the external IP of your organization , thus bypassing cyberoam. Detecting your external IP is pretty simple
Here the site will display your IP address. Please note down your IP address which we will be using again in the further steps.
Step 4 : Scanning open ports for your external IP address
Run the free port scanner software which was installed in Step 2. Enter the IP displayed in the field for IP address. Keep the other settings default and perform and port scan. This may take a few minutes.
A. Entering IP address whose port has to be scanned.
B. Scan results
Once the scan is completed note down the port number of the port named “ndl-aas”. This ends the first phase of haking cyberoam
Phase 2 : Configuring proxy server
The second software require to hack cyberoam is Proxifier. This software helps us to bypass cyberoam through proxy sevrer. For your convinience i have uploaded it online and you can download it at
Step 2 : Install proxifier software
Once you have downloaded the proxifier software , you have install it on your system. The installation is typical to any other software installation on windows. You can follow the screenshots for smooth installation.
A. Double click on setup file and initialize the installation.
B. Accept Licence Agreement
C. Choose the directory (destination location) where the software has to be installed
E. Choose whether you want to create desktop icon (optional)
F. Ready to install !
G. Completion of installationbypass_cyberoam_17
Please not to deselect launch application while finishing the installation process. proxifier is an proprietary software. If you cannot buy it you have to use a crack (Illegal – at your own risk). You need to replace the original exe file with the crack file , in the installation directory.
Step 3 : Configuring Proxifier software
The key of bypassing cyberoam lies in configuring the proxifier software. The IP address and port we detected earlier comes to use now.
  • Under menu goto Proxy Settings
  • After opening the proxy setting click on “Add”
  • Enter the IP address and port which where detected in earlier step
  • Use “HTTPS” protocol.
  • Check if the proxy is working properly (Else can’t help)
  • Select OK
  • Done !!!!
  • Open your favorite sites now !
Although this method is a tedious , time consuming it yields the best results. It is almost impossible for the network administrator to block this method !
Note : It might not work if your organisation does not have an static IP. You need to run Proxifier first before opening the browser.

5. Go for the data transfer method known as tunneling. By tunneling the download data through an allowed fileserver you could fool the system in thinking that you are downloading some good data (say Anti-Virus updates). In order to do this you will need to know some network programming.


  1. check out new tricks of bypassing cyberoam at

    and see video

  2. Excellent post, this is really a very helpful and interesting post which help all of those people who are interested in this field.

  3. Nice information, using this post we can easily access social sites like YouTube that are blocked in the region in which we are.

  4. Thanks for sharing this info that help web user to give secure tools for web user that allow web user to surf safely with the help of online tools that easily access youtube safely.

  5. Internet security should be in the front of every ones mind. If you are travelling any where and using your laptop or mobile device then you need to use a VPN to protect your information and identity. I found a site comparing the best ones