The original intention of this article is to help SEOer understand other people's attack methods, improve vigilance, and do their own defensive work, rather than willing to see this SEO hitting method is widely used. SEO is a SEOer that increases its ranking by cracking down on rival websites.
Method 1: Use hacker technology to attack competitor websites
Someone may ask, "you treat your opponent as a fool. Do you know if you break into other websites ?" Well, SEO won't be discovered as long as it doesn't do silly things on the attacked website (the most silly thing is to replace the homepage. SEO requires search engine rankings, not names on other websites, and there is no need to make too many changes to other websites. Just do a few small moves.
Action 1: block spider IP addresses on compromised independent servers.
Action 2: After the VM is attacked, if the peer is a dynamic web page, modify its page and add the following code:
Reference content is as follows:
<Meta name = "robots" content = "noindex, nofollow, noarchive"/>
In order not to be discovered, SEO often does not let the code be directly output to the browser, but the HTML is only displayed to the spider. The php code for determining whether the access is from a spider is as follows:
Reference content is as follows:
/**
* Determine whether it is a search engine spider
*
* @ Access public
* @ Return string
*/
Function is_spider ($ record = true)
{
Static $ spider = NULL;
If ($ spider! = NULL)
{
Return $ spider;
}
If (emptyempty ($ _ SERVER [HTTP_USER_AGENT])
{
$ Spider = ";
Return ";
}
$ Searchengine_bot = array (
'Googlebot ',
'Mediapartners-google ',
'Baidider ider + ',
'Msnbot ',
'Yodaobot ',
'Yahoo! Slurp ;',
'Yahoo! Slurp china ;',
'Askspider ',
'Sogou web spider ',
'Sogou push spider'
);
$ Searchengine_name = array (
'Google ',
'Google adsens ',
'Baidu ',
'Msn ',
'Yodao ',
'Yahoo ',
'Yahoo China ',
'Iask ',
'Sogou ',
'Sogou'
);
$ Spider = strtolower ($ _ SERVER [HTTP_USER_AGENT]);
Foreach ($ searchengine_bot AS $ key => $ value)
{
If (strpos ($ spider, $ value )! = False)
{
$ Spider = $ searchengine_name [$ key];
If ($ record = true)
{
$ GLOBALS [db]-> autoReplace ($ GLOBALS [ecs]-> table ('searchengine '), array ('date' => local_date ('Y-m-d'), 'searchengine '=> $ spider, 'Count' => 1 ), array ('Count' => 1 ));
}
Return $ spider;
}
}
$ Spider = ";
Return ";
}
This kind of action also has advanced gameplay, that is, blocking only Baidu spider, blocking only Google spider, or even cyclical alternate blocking, making it even harder to be discovered.
Action 3: The robot.txt of the attacker, which has a higher probability of being detected. However, sometimes the competitor's website runs on a VM, and all the pages automatically generate html, so that SEO cannot execute action 1 and Action 2. This is the only option.
Method 2: low-level method to help others brush Baidu rankings
Many people are ranking Baidu. Of course, most of them are for their own websites. However, there are some other users who are hacking for others' websites, but the lower their competitor's website rankings are. SEO hackers tried to tell Baidu that the website was cheating through the lowest-level cheating method. Come and punish them. Of course, this website is a competitor.
Method 3: create garbage for his webpage
The first two methods are mostly used to attack the opponent's main site. Method 3 is used to attack the competitor's external chain. When a competitor publishes information or soft text on other information networks, if this page can be commented, SEO Hackers often construct a spam comment, and write everything such as the license and spring medicine into it, if the Administrator is negligent and spam messages are not deleted in time, the page will be regarded as spam by the search engine in a few days, and the external link will naturally become invalid.