BLACK HAT SEO THE COMPLETE GUIDE
HERE S WHAT WE COVER PBN s Keyword Stuffing Paid Links Social Signal Hacking Purchasing Reviews Content Scraping OG Data Hacking Blog Comment Spam Paid Indexing Sites Referral Spam DDOSING & Malware Injection
NOTE: BEFORE WE GET STARTED, THIS TUTORIAL IS FOR INFORMATIONAL PURPOSES ONLY. IN NO WAY DO I SUGGEST YOU USE ANY OF THESE TECHNIQUES. IT S MY HOPE THAT BY LEARNING HOW BLACK HAT SEO IS DONE, YOU WILL KNOW WHAT NOT TO DO. MOST IF NOT ALL OF THESE TECHNIQUES COME WITH AN EXTREMELY HIGH RISK OF GETTING IN TROUBLE WITH GOOGLE OR IN SOME CASES EVEN THE LAW.
1. PBN S AKA: PRIVATE BLOG NETWORKS
HOW THEY WORK Private blog networks are networks of multiple websites usually owned by the same entity or individual. These websites are utilized to create content that generally contains contextual links to sites that that entity is trying to help rank. These links are usually similar to the industry the blogs are publishing content about.
HOW THEY LOOK PBN s are easy to identify. All you have to do is plug your suspect into Semrush.com, AHREF s or Open Site Explorer and check out their link profile. If you see multiple links coming in from websites with DA around 10-30 with names like plumbingblogus.com or blog(keyword).com go check out and see if the content on those blogs. Some things to look out for include: grammar issues, content with links that look out of place, no site author, no contact information, no social profiles, low site interactions or traffic (can also check through Semrush.) Note: Some PBN s can be made very well and can be extremely difficult to identify. However, if you see a local or new site that mainly has links from blog sites you have to start to wonder. In the case you do think some one is using PBN s you can report them to Google. http://searchengineland.com/google-targets-sites-using- private-blog-networks-manual-action-ranking-penalties- 204000
HOW TO GET AWAY WITH PBN S If you were to go ahead and start doing PBN s the process is going to be extremely extensive and you re going to have to do A LOT of work. If you want to do PBN s successfully, then these are the main things you re going to want to accomplish. 1. Unique domain names with hopefully different public Whois data, hosting, etc. 2. Regularly updated content that is extremely well written with contextual linking / great link silo infrastructure. 3. Actual human profiles connected as author data on site with contact info and bio s setup. 4. Social profiles with automation setup. 5. Automated Email Marketing Campaigns for backlinks
2. KEYWORD STUFFING This is something I see a lot of people getting away with and it s one of the oldest black hat tricks in the book.
WHAT DOES KEYWORD STUFFING LOOK LIKE? Keyword stuffing is super easy to identify. Usually you will see thousands of words that are just blocks of text to surround main keywords and LSI or synonym variations of those keywords.
HOW TO DO KEYWORD STUFFING I don t recommend keyword stuffing at all as you have to get SUPER lucky not to get penalized these days. If you were to do keyword stuffing use a site like writeraccess.com to get a bunch of content written for you for cheap and then load your main keywords into a tool like LSI graph and get all of the variations of keywords and stuff them into your different h tags, bold and italics, and internal / external links. After, use a site like seoprofiler.com to check for over optimization via keyword density to content ratio.
3. PAID LINKS Paid links can be purchased in the form of PBN s, guest posts, or simply just by DA / PA. There are ways that you can pay for links that aren t necessarily black hat. Here s the different between black hat link building and grey / white hat Black hat: Asking to buy links from a website or going to Google and finding sites that sell links and buying said links. Grey hat: Asking for link exchange or offering a product sample in exchange for a link. Also, guest posting is a bit grey. White hat: Offering a webpage of yours as a resource to some ones website.
HOW TO BUY LINKS If you do decide to buy links, don t. You re better off going white hat and spending money on some sort of press release or try to get your content featured on a blogging site that gets tons of traffic or interactions.
4. SOCIAL SIGNAL HACKING Although this isn t completely black hat, social media can be heavily abused. Social signals are obviously a ranking factor these days and there are some seriously crazy methods you can use to hack your social signals.
HOW TO DO SOCIAL SIGNAL HACKING I am by no means an expert at social media but I do know a few things. One of those things is that you can automate the heck out of social media. In the next slide I will include a complete list of tools I personally use to generate huge amounts of social interactions on the content I share.
SOCIAL AUTOMATION TOOLS Instagram: Instagress G+: Circlescope Linkedin: Elink Twitter: Managedflitter and Twitter toolkit chrome extension Youtube: Tubebuddy Facebook: Facebook automation toolkit chrome extension Pinterest: NinjaPinner Tumblr: Tumbleniinja Email: Pitchbox
5. PURCHASING REVIEWS Businesses rankings and conversions can seriously sky rocket by having reviews. Here are the black hat ways people get reviews.
BLACK HAT REVIEW GENERATION Some of these techniques include: Buying reviews off sites like Fiverr or Upwork. Offering discounts or money for reviews on GMB, (Google my business) Yelp, or Facebook. Automated outreach to similar businesses and asking for review exchanges. Giving products or services away in exchange for mandatory reviews via third party sites.
6. CONTENT SCRAPING Content scraping is still used to rank a lot of websites because content can easily be ranked for as long as it hasn t been duplicated. Here s the most black hat way I ve seen content scraping work so far.
CONTENT SCRAPING VIA WAY BACK MACHINE The Waybackmachine let s you see websites and the history of content of said websites even after those sites have expired or no longer exist. You can go and find expired websites with something like justdropped.com and plug them into the way back machine, scrape the content, and plug it into Copyscape and see if the content exists anywhere else on the web.
7. OG DATA HACKING OG Data or Open Graph Data lets you specify what you want to share on social sites. There s a way you can get tons of interactions on your shared pages by constantly changing this data.
HOW TO HACK SOCIAL SIGNALS WITH OG DATA Ok so I m not entirely sure this is black hat but this method definitely seems shady. Basically what you do is you get a plugin like SSO Pro for Wordpress or you change your OG data manually. What you can do is change your titles, pictures, descriptions, video, etc. and constantly be updating the page share with new information. This will allow you to share the same page as frequently as you like with different data. You will also get the connected API counts to skyrocket on that page as well because of the high share rate.
8. BLOG COMMENT SPAM Blog comment spam is used to create links or NAPW citations back to a site to get it to rank higher. This technique use to work very well but is now a complete waste of time so I d rather not spend much time covering it.
9. PAID INDEXING SITES Paying to be on a site that s going to list your site is basically the same as paying for links. Don t do it. However, if you have a local business, spend that money on local indexing via Moz Local, Whitespark, or Yext.
10. REFERRAL SPAM Referral spam is used to get into a targeted businesses analytics by visiting their site multiple times with different IP s from the domain you re trying to market.
HOW TO DO REFERRAL SPAM If you re going to try to do this you re going to need a subscription to something like HMA and get a domain that you don t care if it get s black listed from Google.
11. DDOSING AND MALEWARE INJECTION Because I don t want to get in trouble I m not going to show you how do this but I will explain you the process. DDOSING is using something called botnets to attack a target website or group of websites and crash it via multiple server requests. Maleware injection is pretty self explanatory.