Ok, suppose you manage it and now there’s a TX and a block with the same hash, what’s the consequence?
I don’t have that much computing power. But I know that it is technically possible, in the same way as it is technically possible to create 64 byte transaction, that would be interpreted as a merkle branch, with two connected 32 byte hashes. Here is how:
+-----------------------+-------------------------+
| blockHeader(80) | bitcoinTransaction(80) |
+-----------------------+-------------------------+
| version(4) | version(4) |
| previousBlockHash(1) | inputCount(1) |
| previousBlockHash(31) | previousTransaction(31) |
| merkleRoot(1) | previousTransaction(1) |
| merkleRoot(4) | previousOutput(4) |
| merkleRoot(1) | emptyInputScript(1) |
| merkleRoot(4) | sequenceNumber(4) |
| merkleRoot(1) | outputCount(1) |
| merkleRoot(8) | amount(8) |
| merkleRoot(1) | outputScriptSize(1) |
| merkleRoot(12) | outputScript(12) |
| timestamp(4) | outputScript(4) |
| targetBits(4) | outputScript(4) |
| nonce(4) | locktime(4) |
+-----------------------+-------------------------+
By using locktime as a nonce, miners can mine a transaction that would start with many zero bits, and can try to trick users, that they mined some valid block. But only full nodes would know that it is not the case, and that this block is fake. However, to make any serious attack on full nodes, it is needed to form a valid block header and a valid transaction at the same time, then some software bugs of the full nodes could cause some chaos. But it is very, very hard. Probably comparable to 64-byte transaction attack. To make it serious, it is needed to hardcode a lot of bytes to make it valid from both points of view: as a transaction and as a block header. That’s why it is quite unexpected to see some serious attack in the near future, but in theory, it is possible.
When it comes to the consequences, I am still not sure, because I need to read more code. Or maybe we could prepare some test version, where for example SHA-256 is reduced to 16 rounds, then it may be possible to mount some kind of such attacks, and see, how that node would behave.