Black hat SEO 2016 The Complete guide - Squarespace · BLACK HAT SEO THE COMPLETE GUIDE. HERE’S...

26
BLACK HAT SEO THE COMPLETE GUIDE

Transcript of Black hat SEO 2016 The Complete guide - Squarespace · BLACK HAT SEO THE COMPLETE GUIDE. HERE’S...

BLACK HAT SEO

THE COMPLETE GUIDE

HERE’S WHAT WE COVER

PBN’s

Keyword Stuffing

Paid Links

Social Signal Hacking

Purchasing Reviews

Content Scraping

OG Data Hacking

Blog Comment Spam

Paid Indexing Sites

Referral Spam

DDOSING & Malware Injection

NOTE: BEFORE WE GET STARTED, THIS TUTORIAL IS FOR INFORMATIONAL PURPOSES ONLY. IN NO WAY DO I SUGGEST YOU USE ANY OF THESE TECHNIQUES. IT’S MY HOPE THAT BY LEARNING HOW BLACK HAT SEO IS DONE, YOU WILL KNOW WHAT NOT TO DO. MOST IF NOT ALL OF THESE TECHNIQUES COME WITH AN EXTREMELY HIGH RISK OF GETTING IN TROUBLE WITH GOOGLE OR IN SOME CASES EVEN THE LAW.

1. PBN’S AKA:

PRIVATE BLOG

NETWORKS

HOW THEY WORKPrivate blog networks are networks of multiple websites usually owned by the same entity or individual. These websites are utilized to create content that generally contains contextual links to sites that that entity is trying to help rank. These links are usually similar to the industry the blogs are publishing content about.

HOW THEY LOOKPBN’s are easy to identify. All you have to do is plug your suspect into Semrush.com, AHREF’s or Open Site Explorer and check out their link profile. If you see multiple links coming in from websites with DA around 10-30 with names like plumbingblogus.com or blog(keyword).com go check out and see if the content on those blogs. Some things to look out for include: grammar issues, content with links that look out of place, no site author, no contact information, no social profiles, low site interactions or traffic (can also check through Semrush.)

Note: Some PBN’s can be made very well and can be extremely difficult to identify. However, if you see a local or new site that mainly has links from blog sites you have to start to wonder. In the case you do think some one is using PBN’s you can report them to Google.

http://searchengineland.com/google-targets-sites-using-private-blog-networks-manual-action-ranking-penalties-204000

HOW TO GET AWAY WITH PBN’SIf you were to go ahead and start doing PBN’s the process is going to be extremely extensive and you’re going to have to do A LOT of work. If you want to do PBN’s successfully, then these are the main things you’re going to want to accomplish.

1. Unique domain names with hopefully different public Whois data, hosting, etc.

2. Regularly updated content that is extremely well written with contextual linking / great link silo infrastructure.

3. Actual human profiles connected as author data on site with contact info and bio’s setup.

4. Social profiles with automation setup.

5. Automated Email Marketing Campaigns for backlinks

2. KEYWORD STUFFING

This is something I

see a lot of people

getting away with

and it’s one of the

oldest black hat

tricks in the book.

WHAT DOES

KEYWORD STUFFING

LOOK LIKE?Keyword stuffing is super easy to identify. Usually you will see thousands of words that are just blocks of text to surround main keywords and LSI or synonym variations of those keywords.

HOW TO DO

KEYWORD

STUFFINGI don’t recommend keyword stuffing at all as you have to get SUPER lucky not to get penalized these days. If you were to do keyword stuffing use a site like writeraccess.com to get a bunch of content written for you for cheap and then load your main keywords into a tool like LSI graph and get all of the variations of keywords and stuff them into your different h tags, bold and italics, and internal / external links. After, use a site like seoprofiler.com to check for over optimization via keyword density to content ratio.

3. PAID LINKSPaid links can be purchased in the form of PBN’s, guest posts, or simply just by DA / PA. There are ways that you can pay for links that aren’t necessarily black hat. Here’s the different between black hat link building and grey / white hat

Black hat: Asking to buy links from a website or going to Google and finding sites that sell links and buying said links.

Grey hat: Asking for link exchange or offering a product sample in exchange for a link. Also, guest posting is a bit grey.

White hat: Offering a webpage of yours as a resource to some ones website.

HOW TO BUY LINKSIf you do decide to buy links, don’t. You’re better off going white hat and spending money on some sort of press release or try to get your content featured on a blogging site that gets tons of traffic or interactions.

4. SOCIAL SIGNAL

HACKINGAlthough this isn’t completely black hat, social media can be heavily abused. Social signals are obviously a ranking factor these days and there are some seriously crazy methods you can use to hack your social signals.

HOW TO DO

SOCIAL SIGNAL

HACKINGI am by no means an expert at social media but I do know a few things. One of those things is that you can automate the heck out of social media. In the next slide I will include a complete list of tools I personally use to generate huge amounts of social interactions on the content I share.

SOCIAL AUTOMATION TOOLSInstagram: Instagress

G+: Circlescope

Linkedin: Elink

Twitter: Managedflitter and Twitter toolkit chrome extension

Youtube: Tubebuddy

Facebook: Facebook automation toolkit chrome extension

Pinterest: NinjaPinner

Tumblr: Tumbleniinja

Email: Pitchbox

5. PURCHASING REVIEWSBusinesses rankings and conversions can

seriously sky rocket by having reviews. Here are

the black hat ways people get reviews.

BLACK HAT REVIEW

GENERATION

Some of these techniques include:

Buying reviews off sites like Fiverr or Upwork.Offering discounts or money for reviews on GMB, (Google my business) Yelp, or Facebook.Automated outreach to similar businesses and asking for review exchanges.Giving products or services away in exchange for mandatory reviews via third party sites.•

6. CONTENT SCRAPINGContent scraping is still used to rank a lot of websites because content can easily be ranked for as long as it hasn’t been duplicated. Here’s the most black hat way I’ve seen content scraping work so far.

CONTENT SCRAPING VIA

WAY BACK MACHINEThe Waybackmachine let’s you see websites and the history of content of said websites even after those sites have expired or no longer exist. You can go and find expired websites with something like justdropped.com and plug them into the way back machine, scrape the content, and plug it into Copyscape and see if the content exists anywhere else on the web.

7. OG DATA HACKINGOG Data or Open Graph Data lets you specify what you want to share on social sites. There’s a way you can get tons of interactions on your shared pages by constantly changing this data.

HOW TO HACK SOCIAL SIGNALS WITH OG DATAOk so I’m not entirely sure this is black hat but this method definitely seems shady. Basically what you do is you get a plugin like SSO Pro for Wordpress or you change your OG data manually. What you can do is change your titles, pictures, descriptions, video, etc. and constantly be updating the page share with new information. This will allow you to share the same page as frequently as you like with different data. You will also get the connected API counts to skyrocket on that page as well because of the high share rate.

8. BLOG COMMENT

SPAM

Blog comment spam is used to create links or NAPW citations back to a site to get it to rank higher. This technique use to work very well but is now a complete waste of time so I’d rather not spend much time covering it.

9. PAID INDEXING

SITESPaying to be on a site that’s going to list

your site is basically the same as paying

for links. Don’t do it. However, if you have

a local business, spend that money on

local indexing via Moz Local, Whitespark,

or Yext.

10. REFERRAL SPAMReferral spam is used to get into a targeted businesses analytics by visiting their

site multiple times with different IP’s from the domain you’re trying to market.

HOW TO DO

REFERRAL SPAMIf you’re going to try to do this you’re going to

need a subscription to something like HMA

and get a domain that you don’t care if it

get’s black listed from Google.

11. DDOSING AND

MALEWARE INJECTIONBecause I don’t want to get in trouble I’m not going

to show you how do this but I will explain you the

process. DDOSING is using something called botnets

to attack a target website or group of websites and

crash it via multiple server requests. Maleware

injection is pretty self explanatory.