In the context of network security, how can an attacker enumerate port 139/445 to identify potential vulnerabilities in a system?
a) By analyzing the system's CPU usage patterns.
b) By monitoring the system's RAM allocation.
c) By using network scanning tools to probe open ports and services.
d) By examining the system's file system for unauthorized modifications.