If you had looked at table schema of asp.net membership system they store the hash of raw password along with salt used to produce it. see the schema below,
dbo.aspnet_Membership
ApplicationId
UserId
Password
PasswordFormat
PasswordSalt
MobilePIN
Email
. . .
If a attacker gets hold of the datbase isn't it easier for him to crack open the raw password from the salt and hashed password?
After looking into some records it seems a new salt is generated for each password. What is significance of this?
Would you recommend such a approach, or hard-code constant salt in the code