What do most attacks on hash functions involve?

Finding Collisions
Pre-generating millions of hashes and comparing them to the plain text that generates it.
Really good random guessing.
A and B

A and C

B and C

1 answer

A and B