Most attacks on hash functions involve:

A. Finding collisions.

B. Pre-generating millions of hashes and comparing them to the plain text that generated it.

C. Really good random guessing.

A. Finding collisions.