The more you learn to exploit vulnerability manually, the better you build yourself for Cyber Security industry. In manual process of exploiting vulnerability, along with the way to exploit, you will also observe by yourself the logic behind why such exploitation is turning out (the main reason behind any security misconfiguration), what kind of process is running on the backend side and how I can repair it (i.e., patching the vulnerability). This is the point where your kind-self will transform to be a Cyber Security Professional in true sense.
In this nano journey of manually exploiting SQL Injection, candidates will go through –