Hi,
I have gone through this article and I still feel the salted password hashing is insecure why because as it states in the article "The problem is that the client-side hash logically becomes the user's password. All the user needs to do to authenticate is tell the server the hash of their password. If a bad guy got a user's hash they could use it to authenticate to the server, without knowing the user's password! So, if the bad guy somehow steals the database of hashes from this hypothetical website, they'll have immediate access to everyone's accounts without having to guess any passwords."
My point in this discussion is, considering the possibility of proxies, like Burp/OWASP ZAP/Charles. We can easily get the password's hash value of a user. When an attacker has this hash value he doesn't need to know the actual password but still would be able to authenticate and do normal web access.
Please shed your thoughts on this, is there something to circumvent MIM attacks for salted password hashing?
Regards,
Raju