To avoid IP blacklisting, it allows users to route traffic through a list of proxies. The Mechanics of SQL Injection
Once a vulnerability is confirmed, it can map the database structure (tables and columns) and dump sensitive data, including user credentials and PII.
For example, a standard query might look like: SELECT * FROM users WHERE id = '[user_input]';