If you need to use the Facebook even its blocked by cyberoam you can use this
these two links will guide you … happy facebooking :) +Hackerx sasi
Recently our university has uploaded theCyberoam client on the university server and we cannot access 50% sites through this whatever the site we want to open it says ‘The web site you are trying to access is blocked under university’s ITS Policy’. I am giving you all the detailed and 100% working Hack forCyberoam and how to unblock any site in college as most of the colleges haveCyberoam installed.
WHAT IS CYBEROAM ?
HOW TO UNBLOCK CYBEROAM TO ACCESS BLOCKED SITES ?
First of all I will inform you all that Cyberoam is highly secured internet client and it blocks all the types of proxies like HTTP, CGI, Socks(4/5), Ftp, highanonimity … in short all.
There are a few ways to fool the firewall :-
1. As you all know that every programmer leaves at least One Loop Hole in its programming or software design. Why I am saying this is because Cyberoam has also left this Loop Hole in its design. Now what is this Loop Hole ?
Its HTTPS Loop HOLE…
HOW HTTPS WILL GOING TO UNBLOCK SITES ?
Https are SSL secured HTTP clients and these are most secured sites on the network, that’s whyCyberoam leaves it.
Now the main Point to access the blocked sites you have to use the Https based proxies.
Most of Https based proxies are paid so to search on net for free Https based proxies is a waste of time. I am providing you the one such free proxy service to access blocked sites on theCyberoam. So feel free to surf any site in your college the best thing is that this site will not allowCyberoam admin to track you.
Click on the above Link and surf Freely any site in your college. You need to accept the certificate provided by the site to use it as your web browser show the certificate accept statement.
2. Another way would be to use a PROXY software. The best free PROXY software that work in theCyberoam network are : –
a. Tor Browser Bundle : This used to work wonderfully. This prevents anyone from learning your location or browsing habits. This is for web browsers, instant messaging clients, remote logins, and more. It works in our university currently. To download the Tor Browser Bundle Click Here.
b. Ultrasurf : This one is an good proxy. It can easily bypass the Cyberoam firewall if the connection is good otherwise it doesn’t connect or keeps disconnecting. It doesn’t work in our university now. I think its worth a try.c. Hotspot Shield : Hotspot Shield protects you online and lets you access the information you need. Access blocked services like Facebook, YouTube, Twitter, and Skype in countries or venues where the Internet is censored. Keep hackers from stealing personal information while users are browsing the Internet in public locations like Starbucks. Hotspot Shield also protects against 3.5 million malware threats, including infected websites, phishing and spam sites. Browse the Internet privately and anonymously. Hotspot Shield does all of this without collecting any information on your personal identity.d. Toonel.net : This is an awesome proxy server developed to save traffic. This is 100% Java based and therefore this service can be used on any platform with an installed Java Runtime Environment, including mobile phones.
I will show you the steps to use Toonel.net :-
Step 1 : Download Toonel.net Software.
Step 2 : Run Toonel.net. It only runs if you have Java Runtime Environment installed on your system.
Step 3 : Now run your web browser go to Tools > Internet Options > Connections > LAN Settings (for Internet Explorer) and enter the address 127.0.0.1 & the port 8080 then press OK.
Step 4 : Enjoy !
3. Another cool way to fool the system is to use a VPN software like Hamachi. Find someone who would be willing to share a network connection with you, then connect through Hamachi and use the net uninterrupted. You could even setup a server at your own home and connect to your own computer. Institutes normally require VPN services so they NEVER block VPN ports.
4. One more way is little complicated and requires two different software and manual configurations but ultimately at the end you get the freedom !! Freedom to be unmonitored !!!
Step 1 : Download Free Port Scanner Software.
Step 2 : Install Free Port Scanner on your system.
Step 3 : Detect the static IP assigned to your organisation. www.WhatIsMyIP.com.
Step 4 : Scan open ports for your static IP address.
Step 5 : Download Proxifier.
Step 6 : Install proxifier software.
Step 7 : Configure proxifier software with the static IP & the open port (generally 3128) for it.
above process in pics
How to get going??
Phase 1 : Detecting external IP and open ports
Step 1 : Download Free Port Scanner Software
The first software required to crack software is a free port scanner software. For your convenience i have upload it online and you can download fromhttp://hotfile.com/dl/13028395/0467e17/FreePortScanner.rar.html
Download now !
Step 2 : Install free port scanner
Once you have downloaded the free port scanner , you have install it on your system. The installation is typical to any other software installation on windows. You can follow the screenshots for smooth installation.
A. Double click on setup file and initialize the installation.
B. Choose the directory (destination location) where the software has to be installed
C. Select the start menu folder
D. Choose whether you want to create desktop icon and quick launch icon (optional)
E. Ready to install !
F. Completion of installation and launching the application.
Step 3 : Detecting the static IP assigned to your organization.
We need to find out the static IP assigned to your organization which is allocated by the ISP. Here the mechanism of hacking cyberoam is the route the packets directly to the external IP of your organization , thus bypassing cyberoam. Detecting your external IP is pretty simple
- Goto www.WhatIsMyIP.com
Here the site will display your IP address. Please note down your IP address which we will be using again in the further steps.
Step 4 : Scanning open ports for your external IP address
Run the free port scanner software which was installed in Step 2. Enter the IP displayed atwww.WhatIsMyIP.com in the field for IP address. Keep the other settings default and perform and port scan. This may take a few minutes.
A. Entering IP address whose port has to be scanned.
B. Scan results
Once the scan is completed note down the port number of the port named “ndl-aas”. This ends the first phase of haking cyberoam
Phase 2 : Configuring proxy server
Step 1 : Download Proxifier – proxy software
The second software require to hack cyberoam is Proxifier. This software helps us to bypasscyberoam through proxy sevrer. For your convinience i have uploaded it online and you can download it at http://hotfile.com/dl/12316294/d423ac4/Proxifier_v2.7_CrAcK.rar.html
Step 2 : Install proxifier software
Once you have downloaded the proxifier software , you have install it on your system. The installation is typical to any other software installation on windows. You can follow the screenshots for smooth installation.
A. Double click on setup file and initialize the installation.
B. Accept Licence Agreement
C. Choose the directory (destination location) where the software has to be installed
D. Select the start menu folder
E. Choose whether you want to create desktop icon (optional)
F. Ready to install !
G. Completion of installation
Please not to deselect launch application while finishing the installation process. proxifier is an proprietary software. If you cannot buy it you have to use a crack (Illegal – at your own risk). You need to replace the original exe file with the crack file , in the installation directory.
Step 3 : Configuring Proxifier software
The key of bypassing cyberoam lies in configuring the proxifier software. The IP address and port we detected earlier comes to use now.
- Under menu goto Proxy Settings
- After opening the proxy setting click on “Add”
- Enter the IP address and port which where detected in earlier step
- Use “HTTPS” protocol.
- Check if the proxy is working properly (Else can’t help)
- Select OK
- Done !!!!
- Open your favorite sites now !
Although this method is a tedious , time consuming it yields the best results. It is almost impossible for the network administrator to block this method !
Note : It might not work if your organisation does not have an static IP. You need to run Proxifier first before opening the browser.
5. Go for the data transfer method known as tunneling. By tunneling the download data through an allowed fileserver you could fool the system in thinking that you are downloading some good data (say Anti-Virus updates). In order to do this you will need to know some network programming.
by:-shubham :)) have fuNN