Skip to main content

Make Money from Hacked Website (Without Selling or Bug Bounty)



People want to make huge amount of money by their skills. But often they think, are skills really suitable for making money?
I don’t know about other skills but hacking is a crazy skill that can turn a poor guy into a millioner!!

If you’ve searched about making money from hacking, you may got some bullshit articles about “Bug Bounty” programs. But its not for everyone. It is very difficult to find security vulnerabilities is popular websites. But you can find a lot of vulnerable websites on the internet having a good amount of traffic and their admins don’t offer bug bounties (they don’t care about security, let alone Bug bounty). Many hackers exploit their vulnerability and try to make money by selling shell or user information including Credit Card data. But it’s risky and often you may not want to do that for various reason.

If you are searching a way to make money from hacking a website without selling shell or selling its database or even a bug bounty this post for is specially for you. I was also searching for something like this but I haven’t got anything that can blow up my mind. Then I started thinking about it and got an idea!

The idea is, we are going to add an “On click pop under” advertisement on that website and make money from it. Now days, on click pop under ads are very popular for their silent activity. I’m not talking about showing ads on page. We are adding a JavaScript code which will create a pop under window in the visitors’ browser to show ads in background. The website won’t be harmed and in this case I think it’s a good grey hat job!!

But the point is, it is very hard to find a good pop-under ad network which pays as high as AdSense does. After using a lot of ad networks, I’ve found Propeller which is pretty similar what we are expecting. Propeller is one of the top ad networks which provides good CPM (Cost Per Mille) ads even if your website is illegal!! So what to do now? Follow my steps –


Requirements:

   
   1. A hacked website with good traffic
   2. A Propeller publisher account

How to do:


Step 1 :  Register

Step 2 :  After registration, login to your Propeller publisher account. Select “Site” from the right                      sidebar and then click on “Add Site”



Step 3 : Enter the site URL. It will ask you to verify it. Copy that verification code and past it in                       <head> tag of your hacked site’s index page.








Step 4 : Now click the verify button.

Step 5 : After verification, it will ask you to select ad type. We’ve to use “On click Pop-under”.                         Select  that.




Step 6 : Copy the ad code and past it into the <head> tag of your hacked site’s index page and other                 often visited pages.



Step 7 : Sit back and relax

So it’s easy right? Propeller "Statistics" board updates after an hour so you have to wait for an hour to see your first earning from a hacked website!!

How much you will earn:


Well, it depends on traffic quality and visitor’s geographical location. if most of the visitors are from high CPM countries like United States, Canada, United Kingdome, Australia, you may earn about 10-20$ per 1000 visits. Otherwise, you will earn 5-10$ per 1000 visitors.

Imagine you’ve hacked a Canadian site which reach 1000 traffic every day, you will earn (20 * 30) 600$ per month from it. Do the same thing in 10 other sites and make 6000$ per month for actually nothing!

But remember, don’t put ads in every single website you’ve hacked. Find some websites with good traffic and use them to show ads.

I hope this article satisfied you. Keep visiting my blog for more ideas. Invite your friends and share my posts. Leave a comment so that I can hear you. You can lean some crazy hacking techniques from my all-time favorite blog Null Byte. See ya………… 

Comments

Popular posts from this blog

TCP Flood & IP Spoofing Tutorial - Hping3 (With Effective Tricks)

hping is a command-line oriented TCP/IP packet assembler/analyzer. Using hping3 you are able to perform at least the following stuff: Test firewall rules Testing Network performance using different protocols, packet size, TOS (type of service) and fragmentation Remote OS fingerprinting. TCP/IP stack auditing Today, we will use hping3 for testing network performance. In other words we will use it to do DDOS Attack Tests. We can start “Help Document” by typing “hping3 --help” on the command line. Hping3 Important Parameters :  The flood parameter : Activates the fastest packet sending mode The destport(p) parameter : Specifies the destination port The spoof(a) parameter : Specifies which IP Adress is to be spoofed The rand-source parameter : Activates the random source address mode Although the above parameters are important, it should be selected which flag is set to determine the main attack type.  Main Attack Types :  The syn(S) param...

Increase computer performance by hidden REGISTRY HACK

Having a computer whatever it’s desktop or laptop we play games of do something crazy. We wants to make our computer faster and improve its performance. There’s a lot of video on youtube but this video is quite different. If you are looking for a cool way to improve computer performance this is the perfect video for you. In this video you are going to learn a cool registry hack. Don’t worry it’s legal. Let’s do it. First go to “RUN” and then type “regedit” Then follow my steps. Before doing this I’m recommending   you to clean up your registry errors. I personally use Ccleaner to do this. After all just restart your computer and watch the different. It will optimize your computer speed and you will get a cool gaming experience. I promise you this video will change your experience. You don’t need any extra software like Advanced System Care to Tune Up utilities. This is a hidden Microsoft secret that most of hackers use. Go crazy and enjoy it. Thanks for watching a...

Dos&DDos Attacks - Zombie - Botnets

Hi all, today i am going to write about Dos & DDos Attacks. Cyber security is based on three components. These are Confidentiality, Integrity and Accessibility(CIA). This type of attack is in the class of accessibility component. The level of danger of Dos&DDos attacks is lower than the other attack types because there is no possibility of an attacker to infiltrate the system in this attack type.   There are some things that need to be known before they go to Dos & DDos attacks. If the incoming DDos attack is bigger than the bandwidth you have, there is nothing you can do. If you want to protect yourself in this case, you need to get support from your ISP. The majority of Dos & DDos attacks are not bandwidth attacks. You can not always out of service the victim. Sometimes you just slow it down. Dos Attacks(Denial of Service) Dos attacks are the type of attack to make systems unserviceable. Attackers perform Dos attacks ...