Help with cracking a WPA
#1
I'm trying to construct a command line to crack a WPA2. Facts I know about this WPA2:

1) it is 10 digits, digits only
2) the first 4 digits are 9999

So at first I created:

hashcat64 -m 2500 -a 3 -1 9999?d?d?d?d?d?d test.hccap

which gave me a result with an obscene about of time to complete on my 970, which I think is incorrect. It was a year +. Next I tried removing the -1 which obviously won't work because hashcat thinks the 9999?d?d?d?d?d?d should be a file. 

So hear I am looking for some assistance constructing the proper command line for this. Any direction would be greatly appreciated.

Thanks.
#2
use this:

Code:
hashcat64 -w 4 -m 2500 test.hccap -a 3 9999?d?d?d?d?d?d

-1 is used to define a custom charset, you dont need it because ?d is already enough for digits-only. nevertheless here is a correct -1 example:

Code:
hashcat64 -w 4 -m 2500 test.hccap -a 3 -1 abcdef?d 9999?1?1?1?1?1?1

this defines lowercase hex (abcdef + ?d) as custom charset 1 and use it in the mask. workload profile -w 4 will speed things up. if you're working on the same machine, try -w 3 or -w 2 to avoid lagging.
#3
So all I needed to do was move the charset to the end of the command line. So simple. Took 4 seconds to crack the hash ;-)

hashcat64 -w 2 -m 2500 test.hccap -a 3 9999?d?d?d?d?d?d

Thank you very much for the help.