Sunday, October 28, 2012

Unblock / Hack Cyberoam to Access the Blocked Sites

How to Unblock or Hack Cyberoam to Access the Blocked Sites

If you need to use the Facebook even its blocked by cyberoam you can use this

these two links will guide you ... happy facebooking :) +Hackerx sasi 

Recently our university has uploaded the Cyberoam client on the university server and we cannot access 50% sites through this whatever the site we want to open it says 'The web site you are trying to access is blocked under university's ITS Policy'. I am giving you all the detailed and 100% working Hack for Cyberoam and how to unblock any site in college as most of the colleges have Cyberoam installed.

Cyberoam is all-inclusive UTM solution offers a well-coordinated defense through tightly integrated best-of-breed security solutions over a single interface -Stateful inspection firewall, VPN, gateway anti-virus, gateway anti-spam, gateway anti-malware, intrusion prevention system (IPS), content filtering, bandwidth management (QoS), multiple link management and enhanced user-based reporting.
That means it maintains records "Who is Doing What" ?

First of all I will inform you all that Cyberoam is highly secured internet client and it blocks all the types of proxies like HTTP, CGI, Socks(4/5), Ftp, highanonimity ... in short all.

There are a few ways to fool the firewall :- 

1. As you all know that every programmer leaves at least One Loop Hole in its programming or software design. Why I am saying this is because Cyberoam has also left this Loop Hole in its design. Now what is this Loop Hole ?

Its HTTPS Loop HOLE...


Https are SSL secured HTTP clients and these are most secured sites on the network, that's why Cyberoam leaves it.

Now the main Point to access the blocked sites you have to use the Https based proxies.

Most of Https based proxies are paid so to search on net for free Https based proxies is a waste of time. I am providing you the one such free proxy service to access blocked sites on the Cyberoam. So feel free to surf any site in your college the best thing is that this site will not allow Cyberoam admin to track you.
Click on the above Link and surf Freely any site in your college. You need to accept the certificate provided by the site to use it as your web browser show the certificate accept statement.

2. Another way would be to use a PROXY software. The best free PROXY software that work in the Cyberoam network are : -

a. Tor Browser Bundle : This used to work wonderfully. This prevents anyone from learning your location or browsing habits. This is for web browsers, instant messaging clients, remote logins, and more. It works in our university currently. To download the Tor Browser Bundle Click Here.

b. Ultrasurf : This one is an good proxy. It can easily bypass the Cyberoam firewall if the connection is good otherwise it doesn't connect or keeps disconnecting. It doesn't work in our university now. I think its worth a try.

c. Hotspot Shield : Hotspot Shield protects you online and lets you access the information you need. Access blocked services like Facebook, YouTube, Twitter, and Skype in countries or venues where the Internet is censored. Keep hackers from stealing personal information while users are browsing the Internet in public locations like Starbucks. Hotspot Shield also protects against 3.5 million malware threats, including infected websites, phishing and spam sites. Browse the Internet privately and anonymously. Hotspot Shield does all of this without collecting any information on your personal identity.

d. : This is an awesome proxy server developed to save traffic. This is 100% Java based and therefore this service can be used on any platform with an installed Java Runtime Environment, including mobile phones.

I will show you the steps to use :-

Step 1 : Download Software.

Step 2 : Run It only runs if you have Java Runtime Environment installed on your system.

Step 3 : Now run your web browser go to Tools > Internet Options > Connections > LAN Settings (for Internet Explorer) and enter the address & the port 8080 then press OK.

Step 4 : Enjoy !

3. Another cool way to fool the system is to use a VPN software like Hamachi. Find someone who would be willing to share a network connection with you, then connect through Hamachi and use the net uninterrupted. You could even setup a server at your own home and connect to your own computer. Institutes normally require VPN services so they NEVER block VPN ports.

4. One more way is little complicated and requires two different software and manual configurations but ultimately at the end you get the freedom !! Freedom to be unmonitored !!!

Step 1 : Download Free Port Scanner Software.

Step 2 : Install Free Port Scanner on your system.

Step 3 : Detect the static IP assigned to your organisation.

Step 4 : Scan open ports for your static IP address.

Step 5 : Download Proxifier.

Step 6 : Install proxifier software.

Step 7 : Configure proxifier software with the static IP & the open port (generally 3128) for it.

above process in pics

How to get going??
Phase 1 : Detecting external IP and open ports
The first software required to crack software is a free port scanner software. For your convenience i have upload it online and you can download from
Download now !
Step 2 : Install free port scanner
Once you have downloaded the free port scanner , you have install it on your system. The installation is typical to any other software installation on windows. You can follow the screenshots for smooth installation.
A. Double click on setup file and initialize the installation.
B. Choose the directory (destination location) where the software has to be installed
C. Select the start menu folderbypass_cyberoam_03
D. Choose whether you want to create desktop icon and quick launch icon (optional)
E. Ready to install !
F. Completion of installation and launching the application.
Step 3 : Detecting the static IP assigned to your organization.
We need to find out the static IP assigned to your organization which is allocated by the ISP. Here the mechanism of hacking cyberoam is the route the packets directly to the external IP of your organization , thus bypassing cyberoam. Detecting your external IP is pretty simple
Here the site will display your IP address. Please note down your IP address which we will be using again in the further steps.
Step 4 : Scanning open ports for your external IP address
Run the free port scanner software which was installed in Step 2. Enter the IP displayed in the field for IP address. Keep the other settings default and perform and port scan. This may take a few minutes.
A. Entering IP address whose port has to be scanned.
B. Scan results
Once the scan is completed note down the port number of the port named “ndl-aas”. This ends the first phase of haking cyberoam
Phase 2 : Configuring proxy server
The second software require to hack cyberoam is Proxifier. This software helps us to bypass cyberoam through proxy sevrer. For your convinience i have uploaded it online and you can download it at
Step 2 : Install proxifier software
Once you have downloaded the proxifier software , you have install it on your system. The installation is typical to any other software installation on windows. You can follow the screenshots for smooth installation.
A. Double click on setup file and initialize the installation.
B. Accept Licence Agreement
C. Choose the directory (destination location) where the software has to be installed
E. Choose whether you want to create desktop icon (optional)
F. Ready to install !
G. Completion of installationbypass_cyberoam_17
Please not to deselect launch application while finishing the installation process. proxifier is an proprietary software. If you cannot buy it you have to use a crack (Illegal – at your own risk). You need to replace the original exe file with the crack file , in the installation directory.
Step 3 : Configuring Proxifier software
The key of bypassing cyberoam lies in configuring the proxifier software. The IP address and port we detected earlier comes to use now.
  • Under menu goto Proxy Settings
  • After opening the proxy setting click on “Add”
  • Enter the IP address and port which where detected in earlier step
  • Use “HTTPS” protocol.
  • Check if the proxy is working properly (Else can’t help)
  • Select OK
  • Done !!!!
  • Open your favorite sites now !
Although this method is a tedious , time consuming it yields the best results. It is almost impossible for the network administrator to block this method !
Note : It might not work if your organisation does not have an static IP. You need to run Proxifier first before opening the browser.

5. Go for the data transfer method known as tunneling. By tunneling the download data through an allowed fileserver you could fool the system in thinking that you are downloading some good data (say Anti-Virus updates). In order to do this you will need to know some network programming.


  1. Hello Genius(Sir/Mam)...,its so nice of you helping us out..thank you so much, but i have one small question..can these software & tools also help in protecting my MAC address in case i want to download movies from torrent clients...?? and in case if it does not, then what are the other options..?? (",)My university network works on 'Cyberoam Client for corporate'.

    With Regards:
    A confused Arts Student.:)

  2. What are the other way to hack if proxifier is blocked? and how i can download from torrent

    bypass cyberoam or security at school, office colege

  4. Hi i tried all tricks but not able to access blocked sites, I my office using cyberoam firewall... please help me out

  5. i was using proxifier before but nowadays it stopped working since they kind of upgraded cyberoam
    i currently use psiphon 3 but i can only surf i wanna play legue of legends and all plz help me

  6. When people say hackers are not reliable I laugh at them aloud. I was introduced to a competent hacker. when I had marital issues with my husband,he help me hack into his facebook account. I couldn’t believe it when he did it in 4 hours. he is very good and trustworthy.He offer other facebook, whatsapp instagram & change of Grades.I want to fully recommed for helping me .He saved my life literally, at least I owe him publicity

  7. When people say hackers are not reliable I laugh at them aloud. I was introduced to a competent hacker. when I had marital issues with my husband,he help me hack into his facebook account. I couldn’t believe it when he did it in 4 hours. he is very good and trustworthy.He offer other facebook, whatsapp instagram & change of Grades.I want to fully recommed for helping me .He saved my life literally, at least I owe him publicity

  8. Hello everyone, if you need to boost your credit score excellently within a short period, hack a cell phone remotely, computer or change your grades (at any level or institution), contact He's efficient, and been really helpful with my credit turn, I can't thank him enough, say kimberly referred you he'll help

  9. If you need to hire a real hacker to help spy on your partner's cell phone remotely, change your grades or boost your credit score. Contact this helpline +1 347.857.7580 or the email address



Image Slider By The slide is a linking image  Welcome to Engineer Portal... #htmlcaption

Tamil Short Film Laptaap

Tamil Short Film Laptaap


About Blogging (1) Advance Data Structure (2) ADVANCED COMPUTER ARCHITECTURE (4) Advanced Database (4) ADVANCED DATABASE TECHNOLOGY (4) ADVANCED JAVA PROGRAMMING (1) ADVANCED OPERATING SYSTEMS (3) ADVANCED OPERATING SYSTEMS LAB (2) Agriculture and Technology (1) Analag and Digital Communication (1) Android (1) Applet (1) ARTIFICIAL INTELLIGENCE (3) aspiration 2020 (3) assignment cse (12) AT (1) AT - key (1) Attacker World (6) Basic Electrical Engineering (1) C (1) C Aptitude (20) C Program (88) C# AND .NET FRAMEWORK (11) C++ (1) Calculator (1) Chemistry (1) Cloud Computing Lab (1) Compiler Design (8) Computer Graphics Lab (31) COMPUTER GRAPHICS LABORATORY (1) COMPUTER GRAPHICS Theory (1) COMPUTER NETWORKS (3) computer organisation and architecture (1) Course Plan (2) Cricket (1) cryptography and network security (3) CS 810 (2) cse syllabus (29) Cyberoam (1) Data Mining Techniques (5) Data structures (3) DATA WAREHOUSING AND DATA MINING (4) DATABASE MANAGEMENT SYSTEMS (8) DBMS Lab (11) Design and Analysis Algorithm CS 41 (1) Design and Management of Computer Networks (2) Development in Transportation (1) Digital Principles and System Design (1) Digital Signal Processing (15) DISCRETE MATHEMATICS (1) dos box (1) Download (1) ebooks (12) electronic circuits and electron devices (1) Embedded Software Development (4) Embedded systems lab (4) Embedded systems theory (1) Engineer Portal (1) ENGINEERING ECONOMICS AND FINANCIAL ACCOUNTING (5) ENGINEERING PHYSICS (1) english lab (7) Entertainment (1) Facebook (2) fact (31) FUNDAMENTALS OF COMPUTING AND PROGRAMMING (3) Gate (3) General (3) Global warming (1) GRAPH THEORY (1) Grid Computing (11) hacking (4) HIGH SPEED NETWORKS (1) Horizon (1) III year (1) INFORMATION SECURITY (1) Installation (1) INTELLECTUAL PROPERTY RIGHTS (IPR) (1) Internal Test (13) internet programming lab (20) IPL (1) Java (38) java lab (1) Java Programs (28) jdbc (1) jsp (1) KNOWLEDGE MANAGEMENT (1) lab syllabus (4) MATHEMATICS (3) Mechanical Engineering (1) Microprocessor and Microcontroller (1) Microprocessor and Microcontroller lab (11) Mini Projects (1) MOBILE AND PERVASIVE COMPUTING (15) MOBILE COMPUTING (1) Multicore Architecute (1) MULTICORE PROGRAMMING (2) Multiprocessor Programming (2) NANOTECHNOLOGY (1) NATURAL LANGUAGE PROCESSING (1) NETWORK PROGRAMMING AND MANAGEMENT (1) NETWORKPROGNMGMNT (1) networks lab (16) News (14) Nova (1) NUMERICAL METHODS (2) Object Oriented Programming (1) ooad lab (6) ooad theory (9) OPEN SOURCE LAB (22) openGL (10) Openstack (1) Operating System CS45 (2) operating systems lab (20) other (4) parallel computing (1) parallel processing (1) PARALLEL PROGRAMMING (1) Parallel Programming Paradigms (4) pdf (1) Perl (1) Placement (3) Placement - Interview Questions (64) PRINCIPLES OF COMMUNICATION (1) PROBABILITY AND QUEUING THEORY (3) PROGRAMMING PARADIGMS (1) Python (3) Question Bank (1) question of the day (8) Question Paper (13) Question Paper and Answer Key (3) Railway Airport and Harbor (1) REAL TIME SYSTEMS (1) RESOURCE MANAGEMENT TECHNIQUES (1) results (3) semester 4 (5) semester 5 (1) Semester 6 (5) SERVICE ORIENTED ARCHITECTURE (1) Skill Test (1) software (1) Software Engineering (4) SOFTWARE TESTING (1) Structural Analysis (1) syllabus (34) SYSTEM SOFTWARE (1) system software lab (2) SYSTEMS MODELING AND SIMULATION (1) Tansat (2) Tansat 2011 (1) Tansat 2013 (1) TCP/IP DESIGN AND IMPLEMENTATION (1) TECHNICAL ENGLISH (7) Technology and National Security (1) Theory of Computation (3) Thought for the Day (1) Timetable (4) tips (4) Topic Notes (7) tot (1) TOTAL QUALITY MANAGEMENT (4) tutorial (8) Ubuntu LTS 12.04 (1) Unit Wise Notes (1) University Question Paper (1) UNIX INTERNALS (1) UNIX Lab (21) USER INTERFACE DESIGN (3) VIDEO TUTORIALS (1) Virtual Instrumentation Lab (1) Visual Programming (2) Web Technology (11) WIRELESS NETWORKS (1)