1 / 47

A Hackers Guide to Internet Marketing

Learn the ins and outs of internet marketing, including whitehat and blackhat techniques, automation tools, and prevention strategies to maximize your results.

kburk
Download Presentation

A Hackers Guide to Internet Marketing

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. A Hackers Guide to Internet Marketing By Mark Blaszczyk marek@marek.co Skype: Mark_Blaszczyk

  2. Internet Marketing • Advertiser / Merchant • Products • Offers • Network • Broker between Advertiser and Publisher • Adds additional value • Publisher • Has an inventory of visitors • Monetizes inventory with advertisers offer

  3. Ad Delivery

  4. Whitehat Internet Marketing • Search Engine Optimization • relative quality content • Natural Backlinks • Press Releases • Blog Articles • Media Buy Models (Paid Traffic) • Pay Per Click • Banners • Search • Pay Per Impression • Popups • Videos • List Building • Email • Social Media • Result • High visitor retention • High Trust and Authority • High resource overhead

  5. Blackhat Internet Marketing • Search Engine Optimization • garbage content with relative keywords • Spintax {hello|hi|heya|gday|re} {world|planet|earth} {keyword1|keyword2} • Automated Backlinks • Spamdexing • Web 2.0 profile creation • Domain Sniping • .gov .mil .edu backlinks • Viral Marketing • Social Media • Manipulating trends • Self Propagating ads • Result • Poor User Experience • Minimal Resources Required • Extremely Scalable

  6. How to Kung Fu?

  7. How to Kung Fu? • Find an Offer • Generate Traffic • Spamdexing • Viral Marketing • Prevention • How to hide • How to catch

  8. Finding an Offer • What is a CPA offer? • CPA referred to as “Cost Per Action” or “Cost Per Acquisition” • Pays on an action of the user, generally data input • What is an iFrame? • Frames allow a visual HTML Browser window to be split into segments, each of which can show a different document • How can we abuse it? • Alter the appearance of an Advertisers offer • Remove Terms and Conditions • Ability to capture the data entered • Keep user on your site

  9. Automation Tools • Finds related targets • Craft path • Break Captcha • Software • Outsourced • Account Activation • Sends Spintax data with link

  10. XRUMER • Forum Poster • Created by Botmaster in Russia • Scans search engines for footprints (Hrefer) • Has its own self learning Captcha breaker • Automatically signs up and creates profile • Link is dropped in the user profile • Ability to create 2000 profiles per minute • Cost is $500 and $10 per month • Considered as the most aggressive in spamdexing • Provides poor quality links

  11. ScrapeBox • Blog Commenter + more • Scan footprints from search engines • Internal Proxy Scraper • Outsourced Captcha breaking • Link is dropped in the Blog Comments • Approximately 250 blogs per minute • Considered as the Swiss Army Knife • Costs $97 for lifetime license • Provides Low to medium quality links

  12. SENuke • Web2.0 Account Creator / Poster • Targets predefined list of Web2.0 properties • Ability to create Linkwheels • Ability to predict Captchas • Can generate 300 good quality posts in hours • Costs $149 per month • Creates medium to high quality links

  13. Typical Process for Spamdexing • Find a Keyword that gets frequently searched • Register a Domain that fits • Create a simple website with keywords • Add advertising for monetization • Spam the link using tools above

  14. Keyword Research

  15. Brand New Domain

  16. Run Spamdexing Tools • SENuke to create Linkwheel • Scrapebox to Web2.0 properties • Xrumer against all Scrapebox links

  17. Blackhat Viral Marketing • A method of product promotion that relies on getting customers to market an idea – without their consent.

  18. Click Jacking

  19. Click Jacking http://www.repairservicemanuals.com/marek.html

  20. Cookie Stuffing • Load 3rd Party Cookie with Publisher code • Merchant pays Publisher if referral code matches • Seen with iFrame, Object, javascriptetc • User unaware

  21. Cookie Stuffing Examples

  22. Cookie Stuffing Examples

  23. Privacy Invasion • Profile audience • Drive Target relative ads

  24. Stealing Browser History

  25. Who else does this? • youtube.comtechnorati.comcharter.netnewsmax.comnamepros.comyahoo.co.jpsina.com.cnmicrosoft.commail.ruabout.comthesun.co.ukperezhilton.com

  26. Minimizing Detection • Blackhat • Proxy / TOR when Spamdexing • Browser Referrer Spoofing / Removal • Send visitor to legitimate site and javascript POST • Cloaking • Send Search Engine to content pages • Send visitors to money page • Send Dummy Traffic • Spread the offers amongst multiple Networks

  27. Detection and Prevention • Advertiser / Network • Block all TOR traffic • Monitor leads • Blocked referrers will eventually leak due to browser incompatibilities • Detect if Offer page is in iFrame • Enable Browser Cookies and Flash Cookies • Prevents duplicate entries from same computer

  28. Questions?

  29. Resources • http://www.liesdamnedlies.com/ad_industry_101/ • http://en.wikipedia.org/wiki/IFRAME#Frames • http://ghostcpa.com/documentation/ • http://www.scrapebox.com/ • http://www.benedelman.org/news/100708-1.html • http://cseweb.ucsd.edu/~hovav/dist/history.pdf

More Related