A hash collision attack tries to find two inputs that produce the same hash value when run through a cryptographic hash function. This type of attack exploits weaknesses in hash functions to generate collisions, where two distinct messages result in the same hash value. Finding hash collisions can be used to undermine the security of cryptographic protocols that rely on hash functions.