I am developing a web application. Now from security perspective, salted hashing is required for the password while it is sent from client to server. Now my problem is, if I randomly generate a salt, append it to the password and hash the combination, how would this password be verified. As the salt generated is at random, hash of the salt+password combination would be different every time. If I send the same salt generated along with user credentials to the server, this will expose the salt. Exposed salt will create similar trouble as person trying to crack the password can append the exposed salt with different passwords to get the hash and match it. I have checked numerous websites and question on stack overflow but nothing matched my need exactly.
There are tools that can read the memory of browser and steal passwords entered. Therefore salted hashing is required at client side also.