Many of my friends and reader have been asking for an way to bypass cyberoam. Most of the organizations , educational institutes like schools and colleges are implementing cyberoam –unified threat management system now-a-days. Cyberoam is used to make filtration’s to the sites being browsed by the users i.e. unwanted sites are being blocked (Eg: facebook, orkut etc) Let see the details of cyberoam before cracking cyberoam
What is Cyberoam :
Cyberoam is Identity-based unified threat management appliances, offer comprehensive threat protection with firewall-VPN, anti-virus, anti-spam, intrusion prevention system, content filtering in addition to bandwidth management and multiple link load balancing and gateway fail over.
Identity-based controls and visibility are critical components of network security. With identity and network data combined, enterprises are able to identify patterns of behavior by specific users or groups that can signify misuse, unauthorized intrusions, or malicious attacks from inside or outside the enterprise. Activities and security policy rules can be enforced on network segments based on identity.
Hacking Cyberoam !
“For every action there is an equal and opposite reaction”. Similar if cyberoam is blocking something there should be an way to unblock it. Nothing is impossible in the world of programming. The difficult part of cyberoam it is the system comprising of both hardware and software. Now that cyberoam has started blocking ultra surf also we have unblock cyberoam using a new method. this method is little complicated, includes two different software’s and manual configurations. But ultimately at the end you get the freedom ! Freedom to browse the internet freely ! free to open your sites of interest like facebook orkut etc ! Freedom to download warez ! Freedom to download torrents ! Freedom to be unmonitored !
How to get going??
Phase 1 : Detecting external IP and open ports
Step 1 : Download Free Port Scanner Software
The first software required to crack software is a free port scanner software.
Step 2 : Install free port scanner
Once you have downloaded the free port scanner , you have install it on your system. The installation is typical to any other software installation on windows. You can follow the screenshots for smooth installation.
A. Double click on setup file and initialize the installation.

B. Choose the directory (destination location) where the software has to be installed

C. Select the start menu folder
D. Choose whether you want to create desktop icon and quick launch icon (optional)

E. Ready to install !

F. Completion of installation and launching the application.

Step 3 : Detecting the static IP assigned to your organization.
We need to find out the static IP assigned to your organization which is allocated by the ISP. Here the mechanism of hacking cyberoam is the route the packets directly to the external IP of your organization , thus bypassing cyberoam. Detecting your external IP is pretty simple

Step 4 : Scanning open ports for your external IP address
Run the free port scanner software which was installed in Step 2. Enter the IP displayed at www.WhatIsMyIP.com in the field for IP address. Keep the other settings default and perform and port scan. This may take a few minutes.
A. Entering IP address whose port has to be scanned.

B. Scan results

Once the scan is completed note down the port number of the port named “ndl-aas”. This ends the first phase of haking cyberoam
Phase 2 : Configuring proxy server
Step 1 : Download Proxifier – proxy software
The second software require to hack cyberoam is Proxifier. This software helps us to bypass cyberoam through proxy sevrer.

Step 2 : Install proxifier software
Once you have downloaded the proxifier software , you have install it on your system. The installation is typical to any other software installation on windows. You can follow the screenshots for smooth installation.
A. Double click on setup file and initialize the installation.

B. Accept Licence Agreement

C. Choose the directory (destination location) where the software has to be installed

D. Select the start menu folder

E. Choose whether you want to create desktop icon (optional)

F. Ready to install !

G. Completion of installation
Please not to deselect launch application while finishing the installation process. proxifier is an proprietary software. If you cannot buy it you have to use a crack (Illegal – at your own risk). You need to replace the original exe file with the crack file , in the installation directory.
Step 3 : Configuring Proxifier software
The key of bypassing cyberoam lies in configuring the proxifier software. The IP address and port we detected earlier comes to use now.



Although this method is a tedious , time consuming it yields the best results. It is almost impossible for the network administrator to block this method !
Note :

What is Cyberoam :
Cyberoam is Identity-based unified threat management appliances, offer comprehensive threat protection with firewall-VPN, anti-virus, anti-spam, intrusion prevention system, content filtering in addition to bandwidth management and multiple link load balancing and gateway fail over.
Identity-based controls and visibility are critical components of network security. With identity and network data combined, enterprises are able to identify patterns of behavior by specific users or groups that can signify misuse, unauthorized intrusions, or malicious attacks from inside or outside the enterprise. Activities and security policy rules can be enforced on network segments based on identity.
Hacking Cyberoam !
“For every action there is an equal and opposite reaction”. Similar if cyberoam is blocking something there should be an way to unblock it. Nothing is impossible in the world of programming. The difficult part of cyberoam it is the system comprising of both hardware and software. Now that cyberoam has started blocking ultra surf also we have unblock cyberoam using a new method. this method is little complicated, includes two different software’s and manual configurations. But ultimately at the end you get the freedom ! Freedom to browse the internet freely ! free to open your sites of interest like facebook orkut etc ! Freedom to download warez ! Freedom to download torrents ! Freedom to be unmonitored !
How to get going??
Phase 1 : Detecting external IP and open ports
Step 1 : Download Free Port Scanner Software
The first software required to crack software is a free port scanner software.
Step 2 : Install free port scanner
Once you have downloaded the free port scanner , you have install it on your system. The installation is typical to any other software installation on windows. You can follow the screenshots for smooth installation.
A. Double click on setup file and initialize the installation.

B. Choose the directory (destination location) where the software has to be installed

C. Select the start menu folder

D. Choose whether you want to create desktop icon and quick launch icon (optional)

E. Ready to install !

F. Completion of installation and launching the application.

Step 3 : Detecting the static IP assigned to your organization.
We need to find out the static IP assigned to your organization which is allocated by the ISP. Here the mechanism of hacking cyberoam is the route the packets directly to the external IP of your organization , thus bypassing cyberoam. Detecting your external IP is pretty simple
- Goto www.WhatIsMyIP.com

Step 4 : Scanning open ports for your external IP address
Run the free port scanner software which was installed in Step 2. Enter the IP displayed at www.WhatIsMyIP.com in the field for IP address. Keep the other settings default and perform and port scan. This may take a few minutes.
A. Entering IP address whose port has to be scanned.

B. Scan results

Once the scan is completed note down the port number of the port named “ndl-aas”. This ends the first phase of haking cyberoam
Phase 2 : Configuring proxy server
Step 1 : Download Proxifier – proxy software
The second software require to hack cyberoam is Proxifier. This software helps us to bypass cyberoam through proxy sevrer.

Step 2 : Install proxifier software
Once you have downloaded the proxifier software , you have install it on your system. The installation is typical to any other software installation on windows. You can follow the screenshots for smooth installation.
A. Double click on setup file and initialize the installation.

B. Accept Licence Agreement

C. Choose the directory (destination location) where the software has to be installed

D. Select the start menu folder

E. Choose whether you want to create desktop icon (optional)

F. Ready to install !

G. Completion of installation

Please not to deselect launch application while finishing the installation process. proxifier is an proprietary software. If you cannot buy it you have to use a crack (Illegal – at your own risk). You need to replace the original exe file with the crack file , in the installation directory.
Step 3 : Configuring Proxifier software
The key of bypassing cyberoam lies in configuring the proxifier software. The IP address and port we detected earlier comes to use now.
- Under menu goto Proxy Settings

- After opening the proxy setting click on “Add”
- Enter the IP address and port which where detected in earlier step
- Use “HTTPS” protocol.
- Check if the proxy is working properly (Else can’t help)
- Select OK

- Done !!!!
- Open your favorite sites now !

Although this method is a tedious , time consuming it yields the best results. It is almost impossible for the network administrator to block this method !
Note :
- It might not work if your organization does not have an static IP.
- You need to run Proxifier first before opening the browser.
+ comments + 1 comments
my first time visiting this blog, as a whole after I read some articles quite interesting to read
Post a Comment