What do most attacks on hash functions involve?

1. Finding collisions
2. Pre-generating millions of hashed and comparing them to the plain text that generates it
3. Replay good random guessing
A. 1 and 2
B. 1 and 3
C. 2 and 3

A. 1 and 2