Black Hat SEO (The Complete Guide)
This Black Hat SEO tutorial is meant for informational purposes only. In no way do I endorse or recommend you implement any of these techniques.
It’s my hope that by learning how black hat
Black Hat Tactics We Cover:
- Keyword Stuffing
- Paid Links
- Social Signal Hacking
- Purchasing Reviews
- Content Scraping
- OG Data Hacking
- Blog Comment Spam
- Paid Indexing Sites
- Referral Spam
- DDOSING & Malware Injection
PBN’s AKA: Private Blog Networks
Private blog networks are networks of multiple websites usually owned by the same entity or individual.
These websites are utilized to create content that generally contains contextual links to sites that that entity is trying to help rank.
These links are usually similar to the industry the blogs are publishing content about.
How To Identify a PBN
If you see multiple links coming in from websites with DA 10-30 and domain names like plumbingblogus.com or blog(keyword).com go check out the content on those blogs.
Some things to look for when identifying PBN’s include: grammar issues, content with links that look out of place, no site author, no contact information, no social profiles, low site interactions or traffic which you can also check with Semrush or Buzzsumo
Note: Some PBN’s can be made very well and are extremely difficult to identify.
How To Get Away With PBN’s
If you were to go ahead and start doing PBN’s the process is going to be extremely extensive and will require A TON of work.
To do PBN’s successfully, there are certain aspects that you’re going to have to do right.
The following is what you’re going to want to accomplish:
- Unique domain names with hopefully different public Whois data, hosting, etc.
- Regularly updated content that is extremely well written with contextual linking / great link silo infrastructure.
- Actual human profiles connected as author data on site with contact info and bio’s setup.
- Social profiles with automation setup.
- Automated Email Marketing Campaigns for backlinks.
2. Keyword Stuffing
Keyword stuffing is something I see a lot of people getting away with even to this day and it’s probably one of the oldest black hat tricks in the book.
How To Identify KW Spam Tactics
This technique is super easy to identify. Usually, you will see web pages with thousands of words that are essentially just blocks of text to surround main keywords and LSI or synonym variations of those keywords.
How It’s Done
I don’t recommend keyword stuffing at all unless you feel like playing russian roulette with your rankings. You have to get SUPER lucky not to get penalized these days doing this black hat technique.
If you want to do keyword stuffing use a site like writeraccess.com to get a bunch of content written for you for cheap and then load your main keywords into a tool like LSI graph and get all of the variations of keywords and stuff them into your different h tags, bold and italics, and internal / external links.
After, use a site like Seoprofiler.com to check for over optimization via keyword density to content ratio.
3. Paid Links
Paid links can be purchased in the form of PBN’s, guest posts, or simply just by finding sites with high DA / PA. Keep in mind, there are ways you can essentially pay for links that aren’t necessarily black hat (like buying white hat link building services.)
Here are some examples of the differences between black, grey, and white hat link building.
Asking to buy links from a website or going to Google and finding sites that sell links and buying said links.
Asking for link exchange or offering a product sample in exchange for a link. Also, guest posting is a bit grey depending on how you accomplish said guest post.
Offering a webpage of yours as a resource to someone’s website.
How To Buy Links
If you do decide to buy links, don’t. You’re better off going white hat and spending money on a press release or try to get your content featured on a blogging site that gets tons of traffic or interactions.
4. Social Signal Hacking
Although this isn’t completely black hat, social media can and is being heavily abused, mainly via automation.
Social signals are obviously a ranking factor to Google these days and there are some seriously crazy methods you can use to hack your social signals.
How To Do Social Signal Hacking
I am by no means an expert at social media but I do know a few things. One of those things is that you can automate the heck out of social media.
Here’s a complete list of tools I personally use to generate huge amounts of social interactions on the content I share.
Social Automation Tools
5. Purchasing Reviews
Almost any businesses SERP rankings and conversions can seriously skyrocket by having a ton of reviews.
Here are some of the ways black hat’s get reviews:
- Buying reviews off sites like Fiverr or Upwork.
- Offering discounts or money for reviews on GMB, (Google my business) Yelp, or Facebook.
- Automated outreach to similar businesses and asking for review exchanges.
- Giving products or services away in exchange for mandatory reviews via third-party sites.
6. Content Scraping
Content scraping is still probably the most utilized black hat tactic to rank (especially on Youtube) because content can easily rank as long as it hasn’t been too heavily duplicated. This is why people will scrape content and then pay people to alter it and redeliver it with new keyword optimizations, etc.
Here’s the most black hat way I’ve seen content scraping work so far.
Content Scraping Via Way Back Machine
The Waybackmachine lets you see websites and the history of
You can go and find expired websites with something like justdropped.com and plug them into the way back machine, scrape the content, and plug it into Copyscape and see if the content exists anywhere else on the web.
7. OG Data Hacking
OG Data or Open Graph Data lets you specify what you want to share on social sites.
There’s a way you can get tons of interactions on your shared pages by constantly changing this data.
How To Hack Social Signals With OG Data
Ok so I’m not entirely sure this is
What you can do is change your titles, pictures, descriptions, video, etc. and constantly be updating the page share with new information. This will allow you to share the same page as frequently as you like with different data.
You will also get the connected API counts to skyrocket on that page as well because of the high share rate.
8. Blog Comment Spam
Blog comment spam is used to create links or NAPW citations back to a site to get it to rank higher. This technique used to work very well but is now a complete waste of time so I’d rather not spend much time covering it.
9. Paid Indexing Sites
Paying to be on a site that’s going to list your site is basically the same as paying for links. Don’t do it. However, if you have a local business, spend that money on local indexing via Moz Local, Whitespark, or Yext.
10. Referral Spam
Referral spam is used to get into a targeted businesses analytics by visiting their site multiple times with different IP’s from the domain you’re trying to market.
How To Do Referral Spam
If you’re going to try to do this you’re going to need a subscription to something like HMA and get a domain that you don’t care if it get’s blacklisted from Google.
11. DDOSING & Malware Injection
Because I don’t want to get in trouble I’m not going to show you how to do this but I will explain to you the process. DDOSING is using something called botnets to attack a target website or group of websites and crash it via multiple server requests. Malware injection is pretty self-explanatory.