You have been given the task of assessing the strength of authentication methods on a client's server. To conduct your analysis, you choose a popular brute-force tool. With the server's IP address being '192.168.1.50' and having lists of potential usernames and passwords named 'users.txt' and 'passwords.txt', respectively, determine the correct syntax to initiate the brute-force process against the secure remote login protocol.
Medusa --target 192.168.1.50 --userlist users.txt --passwordlist passwords.txt --protocol securelogin
ForceEntry -i 192.168.1.50 -userfile users.txt -passfile passwords.txt -mode securelogin
BruteForceTool --ip 192.168.1.50 --users users.txt --passwords passwords.txt --attack securelogin
Medusa -h 192.168.1.50 -U users.txt -P passwords.txt -M ssh