Concept Flow - SQL injection via network
User sends input over network
Server receives input
Input used in SQL query without checks
Database executes query
Malicious SQL runs, data exposed or changed
Server sends response back to user
This flow shows how a user sends data over a network that the server uses directly in a database query, allowing harmful SQL commands to run.