Beware of three methods to attack websites through SEO

Source: Internet
Author: User

The original intention of this article is to help SEOer understand other people's attack methods, improve vigilance, and do their own defensive work, rather than willing to see this SEO hitting method is widely used. SEO is a SEOer that increases its ranking by cracking down on rival websites.

Method 1: Use hacker technology to attack competitor websites
Someone may ask, "you treat your opponent as a fool. Do you know if you break into other websites ?" Well, SEO won't be discovered as long as it doesn't do silly things on the attacked website (the most silly thing is to replace the homepage. SEO requires search engine rankings, not names on other websites, and there is no need to make too many changes to other websites. Just do a few small moves.

Action 1: block spider IP addresses on compromised independent servers.

Action 2: After the VM is attacked, if the peer is a dynamic web page, modify its page and add the following code:

Reference content is as follows:

<Meta name = "robots" content = "noindex, nofollow, noarchive"/>


In order not to be discovered, SEO often does not let the code be directly output to the browser, but the HTML is only displayed to the spider. The php code for determining whether the access is from a spider is as follows:

Reference content is as follows:

/**
* Determine whether it is a search engine spider
*
* @ Access public
* @ Return string
*/
Function is_spider ($ record = true)
{
Static $ spider = NULL;

If ($ spider! = NULL)
{
Return $ spider;
}

If (emptyempty ($ _ SERVER [HTTP_USER_AGENT])
{
$ Spider = ";

Return ";
}

$ Searchengine_bot = array (
'Googlebot ',
'Mediapartners-google ',
'Baidider ider + ',
'Msnbot ',
'Yodaobot ',
'Yahoo! Slurp ;',
'Yahoo! Slurp china ;',
'Askspider ',
'Sogou web spider ',
'Sogou push spider'
);

$ Searchengine_name = array (
'Google ',
'Google adsens ',
'Baidu ',
'Msn ',
'Yodao ',
'Yahoo ',
'Yahoo China ',
'Iask ',
'Sogou ',
'Sogou'
);

$ Spider = strtolower ($ _ SERVER [HTTP_USER_AGENT]);

Foreach ($ searchengine_bot AS $ key => $ value)
{
If (strpos ($ spider, $ value )! = False)
{
$ Spider = $ searchengine_name [$ key];

If ($ record = true)
{
$ GLOBALS [db]-> autoReplace ($ GLOBALS [ecs]-> table ('searchengine '), array ('date' => local_date ('Y-m-d'), 'searchengine '=> $ spider, 'Count' => 1 ), array ('Count' => 1 ));
}

Return $ spider;
}
}

$ Spider = ";

Return ";
}
This kind of action also has advanced gameplay, that is, blocking only Baidu spider, blocking only Google spider, or even cyclical alternate blocking, making it even harder to be discovered.

Action 3: The robot.txt of the attacker, which has a higher probability of being detected. However, sometimes the competitor's website runs on a VM, and all the pages automatically generate html, so that SEO cannot execute action 1 and Action 2. This is the only option.

Method 2: low-level method to help others brush Baidu rankings
Many people are ranking Baidu. Of course, most of them are for their own websites. However, there are some other users who are hacking for others' websites, but the lower their competitor's website rankings are. SEO hackers tried to tell Baidu that the website was cheating through the lowest-level cheating method. Come and punish them. Of course, this website is a competitor.

Method 3: create garbage for his webpage
The first two methods are mostly used to attack the opponent's main site. Method 3 is used to attack the competitor's external chain. When a competitor publishes information or soft text on other information networks, if this page can be commented, SEO Hackers often construct a spam comment, and write everything such as the license and spring medicine into it, if the Administrator is negligent and spam messages are not deleted in time, the page will be regarded as spam by the search engine in a few days, and the external link will naturally become invalid.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.