Assume
http://chaseonline.chase.com
is a real URL with a web server sitting behind it, i,e, this URL revolves to an IP address or probably several so that there can be a lot of identical servers that allows load balancing from client requests.I guess that probably Chase buys up URLs that are "close" in the URL namespace(<<< how to define the term "namespace"? Lexicographically?? I think the latter is not trivial (because it depends on a post that one defines on top of URL strings ... never mind this comment).
Suppose that given of the URLs (
http://mychaseonline.chase.com
,http://chaseonline.chase.ua
,http://chaseonline.chase.ru
, etc.) is "free" (not bought). I buy one of these free URLs, write my phishing/spoofing server that sits behind my URL and renders the following screen =>https://chaseonline.chase.com/
I work to get my URL indexed (hopefully) at least as high or higher than the real one (
http://chaseonline.chase.com
). Chance is (hopefully) most bank clients/users won't notice my bogus URLs and I start collecting . I then use my server as a client in relationship to the real bank serverhttp://chaseonline.chase.com
, log in and using my collection/list of<user id, password>
tuples to login to each<user id, password>
to create mischief.
Is this a cross-site request forgery? How would one prevent this from occurring?