There is an attack against a weakened version of SHA1 that could be used to create our own boot1 or boot2 if extended to the full version of SHA1. (Important to note, not yet possible to do this for the full SHA1, so can't do yet make the boot1 or boot2 with whatever has we like) Nice part of this attack you can put whatever you want at the start then get the hash you want by appendinby Spudd86 - Software