Skip to main content

Make Money from Hacked Website (Without Selling or Bug Bounty)



People want to make huge amount of money by their skills. But often they think, are skills really suitable for making money?
I don’t know about other skills but hacking is a crazy skill that can turn a poor guy into a millioner!!

If you’ve searched about making money from hacking, you may got some bullshit articles about “Bug Bounty” programs. But its not for everyone. It is very difficult to find security vulnerabilities is popular websites. But you can find a lot of vulnerable websites on the internet having a good amount of traffic and their admins don’t offer bug bounties (they don’t care about security, let alone Bug bounty). Many hackers exploit their vulnerability and try to make money by selling shell or user information including Credit Card data. But it’s risky and often you may not want to do that for various reason.

If you are searching a way to make money from hacking a website without selling shell or selling its database or even a bug bounty this post for is specially for you. I was also searching for something like this but I haven’t got anything that can blow up my mind. Then I started thinking about it and got an idea!

The idea is, we are going to add an “On click pop under” advertisement on that website and make money from it. Now days, on click pop under ads are very popular for their silent activity. I’m not talking about showing ads on page. We are adding a JavaScript code which will create a pop under window in the visitors’ browser to show ads in background. The website won’t be harmed and in this case I think it’s a good grey hat job!!

But the point is, it is very hard to find a good pop-under ad network which pays as high as AdSense does. After using a lot of ad networks, I’ve found Propeller which is pretty similar what we are expecting. Propeller is one of the top ad networks which provides good CPM (Cost Per Mille) ads even if your website is illegal!! So what to do now? Follow my steps –


Requirements:

   
   1. A hacked website with good traffic
   2. A Propeller publisher account

How to do:


Step 1 :  Register

Step 2 :  After registration, login to your Propeller publisher account. Select “Site” from the right                      sidebar and then click on “Add Site”



Step 3 : Enter the site URL. It will ask you to verify it. Copy that verification code and past it in                       <head> tag of your hacked site’s index page.








Step 4 : Now click the verify button.

Step 5 : After verification, it will ask you to select ad type. We’ve to use “On click Pop-under”.                         Select  that.




Step 6 : Copy the ad code and past it into the <head> tag of your hacked site’s index page and other                 often visited pages.



Step 7 : Sit back and relax

So it’s easy right? Propeller "Statistics" board updates after an hour so you have to wait for an hour to see your first earning from a hacked website!!

How much you will earn:


Well, it depends on traffic quality and visitor’s geographical location. if most of the visitors are from high CPM countries like United States, Canada, United Kingdome, Australia, you may earn about 10-20$ per 1000 visits. Otherwise, you will earn 5-10$ per 1000 visitors.

Imagine you’ve hacked a Canadian site which reach 1000 traffic every day, you will earn (20 * 30) 600$ per month from it. Do the same thing in 10 other sites and make 6000$ per month for actually nothing!

But remember, don’t put ads in every single website you’ve hacked. Find some websites with good traffic and use them to show ads.

I hope this article satisfied you. Keep visiting my blog for more ideas. Invite your friends and share my posts. Leave a comment so that I can hear you. You can lean some crazy hacking techniques from my all-time favorite blog Null Byte. See ya………… 

Comments

Popular posts from this blog

TCP Flood & IP Spoofing Tutorial - Hping3 (With Effective Tricks)

hping is a command-line oriented TCP/IP packet assembler/analyzer. Using hping3 you are able to perform at least the following stuff: Test firewall rules Testing Network performance using different protocols, packet size, TOS (type of service) and fragmentation Remote OS fingerprinting. TCP/IP stack auditing Today, we will use hping3 for testing network performance. In other words we will use it to do DDOS Attack Tests. We can start “Help Document” by typing “hping3 --help” on the command line. Hping3 Important Parameters :  The flood parameter : Activates the fastest packet sending mode The destport(p) parameter : Specifies the destination port The spoof(a) parameter : Specifies which IP Adress is to be spoofed The rand-source parameter : Activates the random source address mode Although the above parameters are important, it should be selected which flag is set to determine the main attack type.  Main Attack Types :  The syn(S) parameter: Specifies tha

How To Gain Access MsSQL using Metasploit

Nowadays companies runs more SQL Server databases inhouse than any other database platform, according to Embarcadero Technologies’ Database Survey Report, 83 percent of respondents are running SQL Server in their database environment. Database administrators use simple passwords to facilitate their access to databases. In these two cases, many companies are endangered.   DB Usage of World You can gain access the server systems of many enterprise companies using only the Metasploit Framework and a simple password list. Today I will show you how to get MSSQL passwords and what you can do with this valuable information. We use the “MsSQL Login Module” to detect MsSQL passwords. You can use the following command to select the module. Syntax example: use auxiliary/scanner/mssql/mssql_login We can list the parameters with “options” command. MsSQL Login Module Options All required parameters must be set before the “Mssql Login Module” i

Blind SQL injection on DVWA | security level = HIGH & IMPOSSIBLE !!

hey there, In this video you gonna to watch how i did blind sql injection on DVWA platform when security level was high and i'm also successful in impossible level. That was so easy. I used SQLmap ( http://sqlmap.org ) tool to perform this attack. Impossible level was also so easy but tricky. Watch this video carefully and hope you will also able to do it. For more video please subscribe my  Channel