For example, a person having password 123456.
it's MD5 is e10adc3949ba59abbe56e057f20f883e and SHA1 is 7c4a8d09ca3762af61e59520943dc26494f8941b and after joining both hashes.
Which comes to be e10adc3949ba59abbe56e057f20f883e7c4a8d09ca3762af61e59520943dc26494f8941b,
decreases the risk of getting brute-forced?
Why improvising your own Hash function out of existing hash functions is so bad, because that focuses on composition of hash functions while this one focuses on concatenation. The answer to this question will focus on security-through-obscurity while that question has answers focusing on details of hashing algorithms – Neil Smithline Jul 01 '16 at 21:20