This is kind of a silly question given that hashes are designed to be randomly distributed and hence hopefully without discernible patterns, but it's a an interesting question.
I find silly questions a great way to learn. For instance, in an entertaining way this motivates a deeper discussion about what a hash function is and how it could be compromised.
Yes; it's an interesting question, with a very good and intelligent answer. I (for one) am very happy that there are people, 'hackers', for want of a better term, that hammer on things such as SHA256, just to prove how robust things are.
reply