1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Everything about Black Hatting

Discussion in 'Black Hat SEO' started by Kaabi, Dec 14, 2006.

  1. Kaabi

    Kaabi Newbie

    Joined:
    Dec 14, 2006
    Messages:
    2
    Likes Received:
    0
    Can somebody tell me all the Black Hat technique names and descriptions of them? I don't plan to implement them, but I've always been curious.
     
  2. Diamond Damien

    Diamond Damien Owner BlackHatWorld Staff Member Jr. VIP

    Joined:
    Oct 27, 2005
    Messages:
    55,622
    Likes Received:
    12,440
    Home Page:
    Some of the basic ones are:
    cloaking
    keyword stuffing
    doorway pages
    Scrapping

    I gathered some info which might be useful too :)




    Cloaking is a black hat search engine optimization (SEO) technique in which the content presented to the search engine spider is different from that presented to the users' browser. This is done by delivering content based on the IP addresses or the User-Agent HTTP header of the user requesting the page. When a user is identified as a search engine spider, a server-side script delivers a different version of the web page, one that contains content not present on the visible page. The purpose of cloaking is to deceive search engines so they display the page when it would not otherwise be displayed.
    The only legitimate uses for cloaking used to be for delivering content to users that search engines couldn't parse, like Adobe Flash. As of 2006, better methods of accessibility, including progressive enhancement are available, so cloaking is not necessary. Cloaking is often used as a spamdexing technique, to try to trick search engines into giving the relevant site a higher ranking; it can also be used to trick search engine users into visiting a site based on the search engine description which site turns out to have substantially different, or even pornographic content. For this reason, major search engines consider cloaking for deception to be a violation of their guidelines, and therefore, they delist sites when deceptive cloaking is reported.[1][2][3][4][5]
    Cloaking is a form of the doorway page technique.
    A similar technique is also used on the Open Directory Project web directory. It differs in several ways from search engine cloaking:
    • It is intended to fool human editors, rather than computer search engine spiders.
    • The decision to cloak or not is based upon the HTTP referrer, the user agent or the visitor's IP. The referrer tells the URL of the page on which a user clicked a link to get to the page. Some cloakers will give the fake page to anyone who comes from a web directory website, since directory editors will usually examine sites by clicking on links that appear on a directory web page. Other cloakers give the fake page to everyone except those coming from a major search engine; this makes it harder to detect cloaking, while not costing them many visitors, since most people find websites by using a search engine.
    Cloaking versus IP Delivery

    Cloaking can be a form of IP delivery, where different content is served based upon the requester's IP address. With cloaking, search engines and people never see the other's pages, whereas, with other uses of IP delivery, both search engines and people can see the same pages.
    One use of IP delivery is to determine the requestor's location, and deliver content specifically written for that country or language. IP delivery isn't necessarily cloaking. For instance, Google uses IP delivery for AdWords and AdSense advertising programs in order to target users in different geographic locations, or users who have their browser set for different natural languages.


    As of 2006, many well-known and well respected sites have taken up IP delivery to personalise content for their regular customers. In fact, many of the top 1000 sites, including household names like Amazon (amazon.com), actively use IP delivery. None of these have been banned from search engines because their intention is not deceptive.
     
    • Thanks Thanks x 1
  3. Diamond Damien

    Diamond Damien Owner BlackHatWorld Staff Member Jr. VIP

    Joined:
    Oct 27, 2005
    Messages:
    55,622
    Likes Received:
    12,440
    Home Page:
    Doorway pages are web pages that are created for spamdexing, this is, for spamming the index of a search engine by inserting results for particular phrases with the purpose of sending you to a different page. They are also known as landing pages, bridge pages, portal pages, zebra pages (a humorous arbitrary coinage by Jill Whalen of High Rankings Advisor), jump pages, gateway pages, entry pages and by other names. Doorway pages that redirect visitors without their knowledge use some form of cloaking.


    If you click through to a typical doorway page from a search engine result page, in most cases you will be redirected with a fast Meta refresh command to another page. Other forms of redirection include use of Javascript and server side redirection, either through the .htaccess file or from the server configuration file. Some doorway pages may be dynamic pages generated by scripting languages such as Perl and PHP.


    Doorway pages are often easy to identify in that they have been designed primarily for search engines, not for human beings. Sometimes a doorway page is copied from another high ranking page, but this is likely to cause the search engine to detect the page as a duplicate and exclude it from the search engine listings.
    Because many search engines give you a penalty for using the META refresh command, some doorway pages just trick you into clicking on a link to get you to the desired destination page, or they use Javascript for redirection.


    More sophisticated doorway pages, called Content Rich Doorways, are designed to gain high placement in search results without utilizing redirection. They incorporate at least a minimum amount of design and navigation similar to the rest of the site to provide a more human-friendly and natural appearance. Visitors are offered standard links as calls to action.


    Another form of doorway pages, are using a method called Cloaking. They show a version of that page to the visitor, but different to the one provided to crawlers, using server side scripts, usually using CGI. They know whether it's a bot or a visitor based on their ip address or user-agent.


    Many sites now use content rich doorway pages for their pay-per-click campaign landing pages. These doorway pages may employ server side scripting to count click-throughs, visits, and other user actions to assist with marketing data collection.
     
    • Thanks Thanks x 1
  4. Diamond Damien

    Diamond Damien Owner BlackHatWorld Staff Member Jr. VIP

    Joined:
    Oct 27, 2005
    Messages:
    55,622
    Likes Received:
    12,440
    Home Page:
    Keyword stuffing is considered to be an unethical search engine optimization (SEO) technique. Keyword stuffing occurs when a web page is loaded with keywords in the meta tags or in content. The repetition of words in meta tags may explain why many search engines no longer use these tags.


    Keyword stuffing is used to obtain maximum search engine ranking and visibility for particular phrases. A word that is repeated too often may raise a red flag to search engines. In particular, Google has been known to delist sites employing this technique, and their indexing alogrithm specifically lowers the ranking of sites that do this.


    Hiding text out of view of the visitor is done in many different ways. Text colored to blend with the background, CSS "Z" positioning to place text "behind" an image ? and therefore out of view of the visitor ? and CSS absolute positioning to have the text positioned several very far from the page center, are all common techniques. As of 2005, some of these invisible text techniques can be detected by major search engines.
    "Noscript" tags are another way to place hidden content within a page. While they are a valid optimization method for displaying an alternative representation of scripted content, they may be abused, since search engines may index content that is invisible to most visitors.


    Inserted text sometimes includes words that are frequently searched (such as "sex"), even if those terms bear little connection to the content of a page, in order to attract traffic to advert-driven pages.
     
    • Thanks Thanks x 1
  5. Diamond Damien

    Diamond Damien Owner BlackHatWorld Staff Member Jr. VIP

    Joined:
    Oct 27, 2005
    Messages:
    55,622
    Likes Received:
    12,440
    Home Page:
    Many scrapers will pull snippets and text from websites that rank high for keywords they have targeted. This way they hope to rank highly in the SERPs (Search Engine Results Pages). RSS feeds are vulnerable to scrapers.


    Some scraper sites consist of advertisements and paragraphs of words randomly selected from a dictionary. Often a visitor will click on an advertisement because it is the only comprehensible text on the page. Operators of these scraper sites gain financially from these clicks. Ad networks such as Google AdSense claims to be constantly working to remove these sites from their programs although there is an active polemic about this, since these networks benefits directly from the clicks generated at this kind of sites. From the advertisers point of view, the networks doesn't seem to be making an enough effort to stop this problem.


    A scraper site is a website that pulls all of its information from other websites using web scraping. In essence, no part of a scraper site is original. A search engine is not an example of a scraper site. Sites such as Yahoo and Google scrape content from other websites and index the content so you can search the index by keywords. Search engines then display snippets of the original site content which they have scraped in response to your search.
     
    • Thanks Thanks x 1
  6. Diamond Damien

    Diamond Damien Owner BlackHatWorld Staff Member Jr. VIP

    Joined:
    Oct 27, 2005
    Messages:
    55,622
    Likes Received:
    12,440
    Home Page:
    Referer spam is a kind of spamdexing (spamming aimed at search engines). The technique involves making repeated web site requests using a fake referer url that points to the site the spammer wishes to advertise. Sites that publicize their access logs, including referer statistics, will then end up linking to the spammer's site, which will in turn be indexed by the search engines as they crawl the access logs.


    This benefits the spammer because of the free link, and also gives the spammer's site improved search engine placement due to link-counting algorithms that search engines use.


    Some web sites receive so many referer spam hits that they amount to a denial of service attack on the server because there are not enough resources left on the server to handle legitimate traffic.
     
    • Thanks Thanks x 1
  7. popoko

    popoko BANNED BANNED

    Joined:
    Dec 19, 2006
    Messages:
    46
    Likes Received:
    0
    he's just shy about it :)
     
  8. Kaabi

    Kaabi Newbie

    Joined:
    Dec 14, 2006
    Messages:
    2
    Likes Received:
    0
    No, I'm just curious. On DigitalPoint, there was a topic about Black Hatting, and I was curious so I searched out a forum. The reason I won't use any of these techniques is because I heard that in the long run it hurts you.
     
  9. boots

    boots Newbie

    Joined:
    Dec 22, 2006
    Messages:
    5
    Likes Received:
    0

    yes, BH will "hurt you", please drag your "self" back to DP and tell all your friends you are cool and posted in a BH forum, they will respect you more for your adventuring spirit.
     
  10. ScottHughes

    ScottHughes Registered Member

    Joined:
    Dec 22, 2006
    Messages:
    89
    Likes Received:
    2
    If you generally use white hat methods, then black hat methods will hurt you in the lon run, because you won't be prepared for the risk involved (e.g. possible bans, legal action, etc.). If you usually use black hat methods, then your income is based on black hat sites, and you are prepared for the risk involved with that.
     
  11. r-webb-k

    r-webb-k BANNED BANNED

    Joined:
    Dec 19, 2006
    Messages:
    373
    Likes Received:
    407
    cloaking is very good
     
  12. Professional

    Professional Newbie

    Joined:
    Dec 24, 2006
    Messages:
    42
    Likes Received:
    7
    i'd like to try cloaking in 2007 for sure...i just don't know where to start
     
  13. Diamond Damien

    Diamond Damien Owner BlackHatWorld Staff Member Jr. VIP

    Joined:
    Oct 27, 2005
    Messages:
    55,622
    Likes Received:
    12,440
    Home Page:
    Start 2007 off with a BANG. You don't know where to start? First buy a cheap .info domain then all you need is a cloaking program such as search engine cloaker. Give yourself a weekend to set things up and you'll be done with your first site! :D:cheer2::cheer2:
     
  14. Professional

    Professional Newbie

    Joined:
    Dec 24, 2006
    Messages:
    42
    Likes Received:
    7
    yep :)

    what i meant though was i don't know which niche to start BH with..heehe
     
  15. Theo

    Theo Newbie

    Joined:
    Mar 30, 2007
    Messages:
    12
    Likes Received:
    1
    Occupation:
    Daily
    Location:
    Northern Hemisphere
    The more I read, the more I learn
    Thanks
     
  16. Sickness

    Sickness Newbie

    Joined:
    Mar 17, 2007
    Messages:
    12
    Likes Received:
    0
    What techniques would any of you guys recommend for download sites? (for example download pay sites, torrent sites, and the ones that are kind of :D illegal)
     
  17. turnkeytraders

    turnkeytraders Registered Member

    Joined:
    Mar 6, 2007
    Messages:
    64
    Likes Received:
    7
    Home Page:
    cloaking, link spamming, guest book spamming and forum spamming
     
  18. RushMan

    RushMan Newbie

    Joined:
    Mar 17, 2007
    Messages:
    32
    Likes Received:
    4
    Location:
    Gulf Coast
    great topic. Love to see this kind of back/forth
     
  19. bbopman200

    bbopman200 Newbie

    Joined:
    May 7, 2007
    Messages:
    4
    Likes Received:
    0
    Thanks for the info.
     
  20. tcflying

    tcflying Guest

    The more I read, the more I learn
    Thanks