Examples of cracking Wordpress hashes?
I'm new to oclHashcat, and I've run around the Wiki and the Forums for a bit now, trying to figure out how to actually run oclHashcat on my local Wordpress install.

I can get the hashes easy enough from Wordpress, but how do I begin cracking them?

Since I am running the install locally, I can create user accounts with known passwords, including really weak ones, to test the system and make sure I've figured it out, but I can't figure out how to actually get oclHashcat to crack them.

Are there examples of hashfiles, and the commands to process them? From the Wiki, I know I'll need to type something like:

oclHashcat.exe -a 400 myhashfile.txt

But I don't know how to format the txt or if this is even the right command.
oclHashcat.exe -m 400 -a 0
-a: Attack mode
0 = Straight

-m: hash type
400 = 400 = phpass, MD5(Wordpress), MD5(phpBB3), MD5(Joomla)

I got all info from oclHashcat.exe --help and wiki.
"how to format the txt" => https://hashcat.net/wiki/doku.php?id=example_hashes

Good luck.
I tried that already, it said:

ERROR: Shader Model 1.0 - 1.3 based GPU detected. Support for CUDA was dropped by NVidia.
Remove it from your system or use -d and select only supported cards.

EDIT: I have a GTX 460 and a GT 240 as my two graphics cards. Adding "-d 1" gives me a new error:

ERROR: cuModuleLoad() 209
NV users require ForceWare 346.x or later