EMAIL SPOOFING
HOW TO PERFORM EMAIL SPOOFING
Because core email protocols do not have a built-in method of authentication, it is commonplace for spam and phishing emails to use said spoofing to trick the recipient into trusting the origin of the message.