For example, a person having password 123456
.
it's MD5 is e10adc3949ba59abbe56e057f20f883e
and SHA1 is 7c4a8d09ca3762af61e59520943dc26494f8941b
and after joining both hashes.
Which comes to be e10adc3949ba59abbe56e057f20f883e7c4a8d09ca3762af61e59520943dc26494f8941b
,
decreases the risk of getting brute-forced?
Why improvising your own Hash function out of existing hash functions is so bad
, because that focuses on composition of hash functions while this one focuses on concatenation. The answer to this question will focus on security-through-obscurity while that question has answers focusing on details of hashing algorithms – Neil Smithline Jul 01 '16 at 21:20