CreateComputer
Summary
FSProtect ACL Alias
CreateComputer
AD Alias
Create computer objects
Affected Object Types
OUs, Domains, Containers
Exploitation Certainty
Certain
AD Right
CreateChild
AD Class
Computer
AD Class Guid
bf967a86-0de6-11d0-a285-00aa003049e2
Description
The CreateComputer permission in Active Directory allows you to create new computer accounts. This is useful when you need to quickly add new devices to the network, such as servers or office computers, and ensure they can access appropriate services. When set up correctly, it helps administrators do their work more efficiently and maintains smooth network operations.
However, if this permission is not managed properly, it can create security risks. If an attacker gains this permission, they could create fake computer accounts, hide their activities, and gain access to sensitive parts of the network. This could lead to stolen data, unauthorized changes, and long-lasting, difficult-to-detect security threats. Therefore, it is important to carefully control who can use the CreateComputer permission.
Identification
PowerShell
Active Directory Module
Using the ActiveDirectory PowerShell module, you can enumerate CreateComputer entries.
1. Find-CreateComputer function
2. Scan all Objects
3. Scan a specific object
4. To exclude default admin ACLs to improve visibility
.NET Directory Services
By leveraging PowerShell’s built-in .NET DirectoryServices namespace, you can enumerate CreateComputer entries without relying on any external modules or dependencies.
1. Find-CreateComputerSimple function
2. Scan all containers in the domain
3. Scan a specific container in the domain
4. To exclude default admin ACLs to improve visibility
Active Directory Users and Computers
1. Open Active Directory Users and Computers on your Windows server.
2. Right-click the object name.
3. Select Properties from the context menu.
4. In the Properties window, navigate to the Security tab.
5. Click the Advanced button to open the Advanced Security Settings dialog.
6. In the Advanced Security Settings window, locate and select the relevant Access Control Entry (ACE) for the user or group you wish to configure.
7. Click Edit to modify the selected ACE.
8. In the permissions list, locate and check the option Create computer objects.
9. Click OK to save your changes and close all dialogs.

Exploitation
Windows
Example:
To change the password of the computer object:
Example:

Linux
Example:

Mitigation
Dangerous Access Control Entries should be removed by following the steps below.
1. Open Active Directory Users and Computers, and enable the Advanced Features option.
2. Double-click the affected object and open the Security tab.
3. In this tab, click the Advanced button and open the suspicious Access Control Entry.
4. Remove the rights identified as dangerous.
5. Click OK and Apply to save the changes.

Detection
Adding new Access Control Entries to Active Directory objects modifies the ntSecurityDescriptor attribute of those objects These changes can be detected with Event IDs 5136 and 4662 to identify suspicious modifications.
5136
Audit Directory Service Changes
A directory service object was modified.
ntSecurityDescriptor
https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-5136
4662
Audit Directory Service Access
An operation was performed on an object.
AccessList, AccessMask
https://learn.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4662
4724
An attempt was made to reset an account's password.
Subject, TargetAccount
https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-4724
4722
A user account was enabled.
Subject, TargetAccount
https://learn.microsoft.com/en-us/previous-versions/windows/it-pro/windows-10/security/threat-protection/auditing/event-4722
References
Last updated
Was this helpful?