This Black Hat SEO tutorial is meant for informational purposes only. In no way do I endorse or recommend you implement any of these techniques.
It’s my hope that by learning how black hat seo is done, you will know what not to do and what to watch out for with competitors.
Black Hat SEO Tactics We Cover:
PBN’s
Keyword Stuffing
Paid Links
Social Signal Hacking
Purchasing Reviews
Content Scraping
OG Data Hacking
Blog Comment Spam
Paid Indexing Sites
Referral Spam
DDOSING & Malware Injection
2. HERE’S WHAT WE COVER
PBN’s
Keyword Stuffing
Paid Links
Social Signal Hacking
Purchasing Reviews
Content Scraping
OG Data Hacking
Blog Comment Spam
Paid Indexing Sites
Referral Spam
DDOSING & Malware Injection
3. NOTE: BEFORE WE GET STARTED, THIS TUTORIAL IS
FOR INFORMATIONAL PURPOSES ONLY. IN NO
WAY DO I SUGGEST YOU USE ANY OF THESE
TECHNIQUES. IT’S MY HOPE THAT BY LEARNING
HOW BLACK HAT SEO IS DONE, YOU WILL KNOW
WHAT NOT TO DO. MOST IF NOT ALL OF THESE
TECHNIQUES COME WITH AN EXTREMELY HIGH
RISK OF GETTING IN TROUBLE WITH GOOGLE OR
IN SOME CASES EVEN THE LAW.
5. HOW THEY WORK
Private blog networks are networks of multiple websites
usually owned by the same entity or individual. These
websites are utilized to create content that generally
contains contextual links to sites that that entity is trying
to help rank. These links are usually similar to the
industry the blogs are publishing content about.
6. HOW THEY LOOK
PBN’s are easy to identify. All you have to do is plug your suspect
into Semrush.com, AHREF’s or Open Site Explorer and check out
their link profile. If you see multiple links coming in from websites
with DA around 10-30 with names like plumbingblogus.com or
blog(keyword).com go check out and see if the content on those
blogs. Some things to look out for include: grammar issues,
content with links that look out of place, no site author, no contact
information, no social profiles, low site interactions or traffic (can
also check through Semrush.)
Note: Some PBN’s can be made very well and can be extremely
difficult to identify. However, if you see a local or new site that
mainly has links from blog sites you have to start to wonder. In the
case you do think some one is using PBN’s you can report them to
Google.
http://searchengineland.com/google-targets-sites-using-private-
blog-networks-manual-action-ranking-penalties-204000
7. HOW TO GET AWAY WITH PBN’S
If you were to go ahead and start doing PBN’s the
process is going to be extremely extensive and
you’re going to have to do A LOT of work. If you
want to do PBN’s successfully, then these are the
main things you’re going to want to accomplish.
1. Unique domain names with hopefully different
public Whois data, hosting, etc.
2. Regularly updated content that is extremely well
written with contextual linking / great link silo
infrastructure.
3. Actual human profiles connected as author data
on site with contact info and bio’s setup.
4. Social profiles with automation setup.
5. Automated Email Marketing Campaigns for
backlinks
8. 2. KEYWORD
STUFFING
This is something I
see a lot of people
getting away with
and it’s one of the
oldest black hat
tricks in the book.
9. WHAT DOES KEYWORD
STUFFING LOOK LIKE?
Keyword stuffing is super easy to identify. Usually you
will see thousands of words that are just blocks of text
to surround main keywords and LSI or synonym
variations of those keywords.
10. HOW TO DO
KEYWORD
STUFFING
I don’t recommend keyword stuffing at all as you have to get
SUPER lucky not to get penalized these days. If you were to do
keyword stuffing use a site like writeraccess.com to get a bunch
of content written for you for cheap and then load your main
keywords into a tool like LSI graph and get all of the variations
of keywords and stuff them into your different h tags, bold and
italics, and internal / external links. After, use a site like
seoprofiler.com to check for over optimization via keyword
density to content ratio.
11. 3. PAID LINKS
Paid links can be purchased in the form of
PBN’s, guest posts, or simply just by DA / PA.
There are ways that you can pay for links that
aren’t necessarily black hat. Here’s the different
between black hat link building and grey /
white hat
Black hat: Asking to buy links from a website
or going to Google and finding sites that sell
links and buying said links.
Grey hat: Asking for link exchange or offering
a product sample in exchange for a link. Also,
guest posting is a bit grey.
White hat: Offering a webpage of yours as a
resource to some ones website.
12. HOW TO BUY LINKS
If you do decide to buy links, don’t. You’re better off
going white hat and spending money on some sort of
press release or try to get your content featured on a
blogging site that gets tons of traffic or interactions.
13. 4. SOCIAL SIGNAL
HACKING
Although this isn’t completely black hat,
social media can be heavily abused. Social
signals are obviously a ranking factor these
days and there are some seriously crazy
methods you can use to hack your social
signals.
14. HOW TO DO SOCIAL
SIGNAL HACKING
I am by no means an expert at social
media but I do know a few things. One
of those things is that you can
automate the heck out of social media.
In the next slide I will include a
complete list of tools I personally use
to generate huge amounts of social
interactions on the content I share.
16. 5. PURCHASING REVIEWS
Businesses rankings and conversions can seriously
sky rocket by having reviews. Here are the black hat
ways people get reviews.
17. BLACK HAT REVIEW
GENERATION
Some of these techniques include:
Buying reviews off sites like Fiverr or Upwork.
Offering discounts or money for reviews on
GMB, (Google my business) Yelp, or Facebook.
Automated outreach to similar businesses and
asking for review exchanges.
Giving products or services away in exchange
for mandatory reviews via third party sites.
•
18. 6. CONTENT SCRAPING
Content scraping is still used to rank a lot of websites
because content can easily be ranked for as long as it
hasn’t been duplicated. Here’s the most black hat way I’ve
seen content scraping work so far.
19. CONTENT SCRAPING VIA
WAY BACK MACHINE
The Waybackmachine let’s you see websites and the
history of content of said websites even after those sites
have expired or no longer exist. You can go and find
expired websites with something like justdropped.com
and plug them into the way back machine, scrape the
content, and plug it into Copyscape and see if the content
exists anywhere else on the web.
20. 7. OG DATA HACKING
OG Data or Open Graph Data lets you specify what you
want to share on social sites. There’s a way you can get
tons of interactions on your shared pages by
constantly changing this data.
21. HOW TO HACK
SOCIAL SIGNALS
WITH OG DATA
Ok so I’m not entirely sure this is
black hat but this method definitely
seems shady. Basically what you do
is you get a plugin like SSO Pro for
Wordpress or you change your OG
data manually. What you can do is
change your titles, pictures,
descriptions, video, etc. and
constantly be updating the page
share with new information. This will
allow you to share the same page as
frequently as you like with different
data. You will also get the connected
API counts to skyrocket on that page
as well because of the high share
rate.
22. 8. BLOG COMMENT
SPAM
Blog comment spam is used to create links
or NAPW citations back to a site to get it
to rank higher. This technique use to work
very well but is now a complete waste of
time so I’d rather not spend much time
covering it.
23. 9. PAID INDEXING
SITES
Paying to be on a site that’s going to list
your site is basically the same as paying for
links. Don’t do it. However, if you have a
local business, spend that money on local
indexing via Moz Local, Whitespark, or
Yext.
24. 10. REFERRAL SPAM
Referral spam is used to get into a targeted businesses analytics by visiting their
site multiple times with different IP’s from the domain you’re trying to market.
25. HOW TO DO
REFERRAL SPAM
If you’re going to try to do this you’re going to
need a subscription to something like HMA and
get a domain that you don’t care if it get’s black
listed from Google.
26. 11. DDOSING AND
MALEWARE INJECTION
Because I don’t want to get in trouble I’m not going to
show you how do this but I will explain you the process.
DDOSING is using something called botnets to attack a
target website or group of websites and crash it via
multiple server requests. Maleware injection is pretty self
explanatory.