This Black Hat SEO tutorial is meant for informational purposes only. In no way do I endorse or recommend you implement any of these techniques.

It’s my hope that by learning how black hat seo is done, you will know what not to do and what to watch out for with competitors.

Bonus: Download the free step by step Black-Hat-SEO-The-Complete-Guide or watch the video walk-through.

Black Hat Tactics We Cover:

  • PBN’s
  • Keyword Stuffing
  • Paid Links
  • Social Signal Hacking
  • Purchasing Reviews
  • Content Scraping
  • OG Data Hacking
  • Blog Comment Spam
  • Paid Indexing Sites
  • Referral Spam
  • DDOSING & Malware Injection

PBN’s AKA: Private Blog Networks

Private blog networks are networks of multiple websites usually owned by the same entity or individual.

These websites are utilized to create content that generally contains contextual links to sites that that entity is trying to help rank.

These links are usually similar to the industry the blogs are publishing content about.

How To Identify a PBN

PBN’s are easy to identify. All you have to do is plug your suspect’s website into Semrush.comAHREFS or Open Site Explorer and check out their link profile.

If you see multiple links coming in from websites with DA 10-30 and domain names like or blog(keyword).com go check out the content on those blogs.

Some things to look for when identifying PBN’s include: grammar issues, content with links that look out of place, no site author, no contact information, no social profiles, low site interactions or traffic which you can also check with Semrush or Buzzsumo

Note: Some PBN’s can be made very well and are extremely difficult to identify.

In the case you do think someone is using PBN’s you can report them to Google.


How To Get Away With PBN’s

If you were to go ahead and start doing PBN’s the process is going to be extremely extensive and will require A TON of work.

To do PBN’s successfully, there are certain aspects that you’re going to have to do right.

The following is what you’re going to want to accomplish:

  • Unique domain names with hopefully different public Whois data, hosting, etc.
  • Regularly updated content that is extremely well written with contextual linking / great link silo infrastructure.
  • Actual human profiles connected as author data on site with contact info and bio’s setup.
  • Social profiles with automation setup.
  • Automated Email Marketing Campaigns for backlinks.


2. Keyword Stuffing

Keyword stuffing is something I see a lot of people getting away with even to this day and it’s probably one of the oldest black hat tricks in the book.


How To Identify KW Spam Tactics

This technique is super easy to identify. Usually, you will see web pages with thousands of words that are essentially just blocks of text to surround main keywords and LSI or synonym variations of those keywords.


How It’s Done

I don’t recommend keyword stuffing at all unless you feel like playing russian roulette with your rankings. You have to get SUPER lucky not to get penalized these days doing this black hat technique.

If you want to do keyword stuffing use a site like to get a bunch of content written for you for cheap and then load your main keywords into a tool like LSI graph and get all of the variations of keywords and stuff them into your different h tags, bold and italics, and internal / external links.

After, use a site like to check for over optimization via keyword density to content ratio.


3. Paid Links

Paid links can be purchased in the form of PBN’s, guest posts, or simply just by finding sites with high DA / PA.  Keep in mind, there are ways you can essentially pay for links that aren’t necessarily black hat (like buying white hat link building services.)

Here are some examples of the differences between black, grey, and white hat link building.

Black Hat

Asking to buy links from a website or going to Google and finding sites that sell links and buying said links.

Grey Hat

Asking for link exchange or offering a product sample in exchange for a link. Also, guest posting is a bit grey depending on how you accomplish said guest post.

White Hat

Offering a webpage of yours as a resource to someone’s website.


How To Buy Links

If you do decide to buy links, don’t. You’re better off going white hat and spending money on a press release or try to get your content featured on a blogging site that gets tons of traffic or interactions.


4. Social Signal Hacking

Although this isn’t completely black hat, social media can and is being heavily abused, mainly via automation.

Social signals are obviously a ranking factor to Google these days and there are some seriously crazy methods you can use to hack your social signals.


How To Do Social Signal Hacking

I am by no means an expert at social media but I do know a few things. One of those things is that you can automate the heck out of social media.

Here’s a complete list of tools I personally use to generate huge amounts of social interactions on the content I share.


Social Automation Tools

Instagram: Instagress

G+: Circlescope


Facebook: Facebook automation toolkit chrome extension

Twitter: Managedflitter and Twitter toolkit chrome extension

YoutubeTubebuddy and Tubeassist

Pinterest: NinjaPinner

Tumblr: Tumbleniinja

Email: Pitchbox


5. Purchasing Reviews

Almost any businesses SERP rankings and conversions can seriously skyrocket by having a ton of reviews.

Here are some of the ways black hat’s get reviews:

  • Buying reviews off sites like Fiverr or Upwork.
  • Offering discounts or money for reviews on GMB, (Google my business) Yelp, or Facebook.
  • Automated outreach to similar businesses and asking for review exchanges.
  • Giving products or services away in exchange for mandatory reviews via third-party sites.


6. Content Scraping

Content scraping is still probably the most utilized black hat tactic to rank (especially on Youtube) because content can easily rank as long as it hasn’t been too heavily duplicated. This is why people will scrape content and then pay people to alter it and redeliver it with new keyword optimizations, etc.

Here’s the most black hat way I’ve seen content scraping work so far.


Content Scraping Via Way Back Machine

The Waybackmachine lets you see websites and the history of content of said websites even after those sites have expired or no longer exist.

You can go and find expired websites with something like and plug them into the way back machine, scrape the content, and plug it into Copyscape and see if the content exists anywhere else on the web.


7. OG Data Hacking

OG Data or Open Graph Data lets you specify what you want to share on social sites.

There’s a way you can get tons of interactions on your shared pages by constantly changing this data.


How To Hack Social Signals With OG Data

Ok so I’m not entirely sure this is black hat but this method definitely seems shady. Basically what you do is you get a plugin like SSO Pro for WordPress or you change your OG data manually.

What you can do is change your titles, pictures, descriptions, video, etc. and constantly be updating the page share with new information. This will allow you to share the same page as frequently as you like with different data.

You will also get the connected API counts to skyrocket on that page as well because of the high share rate.


8. Blog Comment Spam

Blog comment spam is used to create links or NAPW citations back to a site to get it to rank higher. This technique used to work very well but is now a complete waste of time so I’d rather not spend much time covering it.


9. Paid Indexing Sites

Paying to be on a site that’s going to list your site is basically the same as paying for links. Don’t do it. However, if you have a local business, spend that money on local indexing via Moz LocalWhitespark, or Yext.

10. Referral Spam

Referral spam is used to get into a targeted businesses analytics by visiting their site multiple times with different IP’s from the domain you’re trying to market.


How To Do Referral Spam

If you’re going to try to do this you’re going to need a subscription to something like HMA and get a domain that you don’t care if it get’s blacklisted from Google.


11. DDOSING & Malware Injection

Because I don’t want to get in trouble I’m not going to show you how to do this but I will explain to you the process. DDOSING is using something called botnets to attack a target website or group of websites and crash it via multiple server requests. Malware injection is pretty self-explanatory.

Leave a Reply

Notify of
Share This