Step 1: Identify Vulnerable Parameter: The attacker identifies the movie_details.php script and determines the parameter(s) used to fetch movie details (e.g., movie_id).
Step 2: Craft Malicious Payload: The attacker crafts a malicious SQL injection payload designed to extract sensitive information. This payload might include commands to retrieve usernames, passwords, or other database contents.
Step 3: Inject Payload: The attacker injects the crafted payload into the vulnerable parameter (e.g., movie_id) via a GET or POST request to movie_details.php.
Step 4: Execute Malicious Query: The server, lacking proper input validation, executes the attacker's injected SQL code as part of the database query.
Step 5: Data Exfiltration: The database server processes the malicious query and returns the results, which may include sensitive data, to the attacker. This could involve the attacker retrieving data from other tables or even dumping the entire database.