Output password verbose viewing for wpa-wpa2?
#1
Is there any way that we can see password being generated using rules,brute force,mask etc... for wpa-wpa2?

It just to see if i'm getting the right rules, mask.. etc
I'm trying to make rules of my own..

Is there a switch like verbose --vv for windows version oclHascat64.exe?

By the way thank you very much for oclHashcat, very helpful programs

TIA
#2
You can use the tool maskprocessor to see your generated words in output.
#3
--stdout with hashcat-cli
#4
Thanks guys, i try the --stdout with hashcat-cli32.exe and i'm able to see the outcome..

I thought with combination mode (2 word lists) I was suppose to get all
combination possible from the first word list combine with the second words list.
But it's not what's happening ,It take the first word list and combine it with itself then same thing with the second word list it combine with itself.


First word list content:
cindy
julie
marie

Second word list content:
1
2
3

my result --stdout:
cindycindy
cindyjulie
cindymarie
juliecindy
juliejulie
juliemarie
mariecindy
mariejulie
mariemarie
11
12
13
21
22
23
31
32
33

What command should i use to combine the 2 word lists together?
like to have for output:
cindy1
cindy2
cindy3
julie1
julie2
julie3
marie1
marie2
marie3


TIA

I usualy use the GPU with oclHascat64.exe
#5
For now hashcat-cli only combines the words in a wordlist with themselves while oclHashcat combines the words from 2 different wordlists,

Note that you can also use combinator from hashcat-utils (which is basically a standalone version of the oclHashcat combinator attack)
#6
Ok thanks.. I try the --stdout in oclHascat64.exe, but i get error
--stdout work well in hashcat-cli.

Thanks for the info guys
#7
oclHashcat does not support --stdout