Slide 1

Slide 1 text

No content

Slide 2

Slide 2 text

Text Minion: Blaze your own security scan Yeuk Hon Wong Security Assurance team, Summer Intern '13

Slide 3

Slide 3 text

Follow along ... https://github.com/yeukhon/talks/pdf/intern2013.pdf https://speakerdeck.com/yeukhon/intern2013

Slide 4

Slide 4 text

Scopes • Minion • IonMonkey fuzzing with UBSan • Security Review • QA

Slide 5

Slide 5 text

Live QA? • #websectools or #security on irc.mozilla.org • Send to yeukhon on IRC • I'll address questions at the end

Slide 6

Slide 6 text

In a typical security review... • Reviewers determine threat analysis after learning about the system specification, user stories and data flow. • Reviewers run scans and do manual code review • Reviewers signs and publishes security review report (mitigations, and vulnerabilities)

Slide 7

Slide 7 text

Problems • Security review relies on the availability of time and collaboration from both the reviewers and developers. • Security scans are usually done by security reviewers. • Security reviews are not agile enough! Y U NO CHECK XSS BEFORE YOU git push upstream?

Slide 8

Slide 8 text

Solutions? We need a developer-first solution. Your security reviewers are go-to person for advice and for formal security review, not for your daily build .

Slide 9

Slide 9 text

Be hold > o < credit: @nurikidy

Slide 10

Slide 10 text

Minion? Create a platform where developers can kick off a scan. URL, a mouse click, and wait for report.

Slide 11

Slide 11 text

Minion? View scan report online and offline. Give me the URL. IRC or emails are fine. No need for formal Viydo conference.

Slide 12

Slide 12 text

Minion? Duck-typing tools. “if it quacks like a tool, it's a tool.”

Slide 13

Slide 13 text

Minion?

Slide 14

Slide 14 text

Minion? Customize an attack plan that works for your use case. Write a configuration file with different parameters for one or multiple scan tools.

Slide 15

Slide 15 text

Minion?

Slide 16

Slide 16 text

Minion? Keep a history of scans. Imagine doing git blame scan1 scan2 on issueX? Or even correlate with other projects? \o/

Slide 17

Slide 17 text

Minion? Keep a history of scans. Imagine doing git blame scan1 scan2 on issueX? Or even correlate with other projects? \o/

Slide 18

Slide 18 text

Minion? Open source. Do whatever you want responsibly.

Slide 19

Slide 19 text

MINION DEMO credit: @nurikidy

Slide 20

Slide 20 text

Minion today 0.3 was announced on July 30th (https://blog.mozilla.org/security/2013/07/30/introducing-minion/) Slowly gaining more contributors and users Received first major pull request from contributor (https://github.com/mozilla/minion-frontend/pull/103) • Focusing on growing the community • Just completed site ownership verification this week (08/13/2013)

Slide 21

Slide 21 text

Minion Roadmap • Focus on growing community • Improve plugin and reporting quality • Grow plugin ecosystem • Front-end UI changes (e.g. add a landing page) • Enabling result artifacts storage https://blog.mozilla.org/security/2013/07/30/introducing-minion/

Slide 22

Slide 22 text

Minion UI mock-up A quick shoutout to my roommate Liu Liu for making a Minion UI mock-up for me. Disclaimer: we don't have any decision on how the future UI will look like, but I want to acknowledge his contribution.

Slide 23

Slide 23 text

No content

Slide 24

Slide 24 text

No content

Slide 25

Slide 25 text

Minion: building a community And we need your contributions.

Slide 26

Slide 26 text

Minion: potentials (I think) • Make security reviews more agile (think of continuous integration). • Help developers (and students!) learn more about application security. • I imagine growing Minion like growing OpenStack or Docker. • Create a security tool ecosystem. • Help standardizing security alert report schema.

Slide 27

Slide 27 text

Minion: resources Source code: https://github.com/mozilla/minion Mailing list: http://groups.google.com/group/mozilla-minion-dev Minion wiki: https://wiki.mozilla.org/Security/Projects/Minion We also use the #websectools channel on irc.mozilla.org

Slide 28

Slide 28 text

Beyond Minion Fuzzing and security review

Slide 29

Slide 29 text

Fuzzing • I was fuzzing IonMonkey using UBSan (undefined behavior sanitizer) • Found several interesting undefined behavior bugs: - runtime error: load of value 98, which is not a valid value for type 'bool' (js::DefineOwnProperty); - JS engine creates unaligned reference to JSObject (0x42) • MDN: https://developer.mozilla.org/en- US/docs/Building_SpiderMonkey_with_UBSan

Slide 30

Slide 30 text

Security Review • Currently reviewing a simple community Django web app with Jacob Haven (another security assurance intern).

Slide 31

Slide 31 text

One week to go … Beyond Mozilla internship

Slide 32

Slide 32 text

Farewell Big thanks to my own team: Stefan Arentz Yvan Boily Simon Bennetts Mark Goodwin

Slide 33

Slide 33 text

Farewell Also to our fuzzers and to our OpSec * Jesse Ruderman * Gary Kwong * Joe Stevenson * Julien Vehent * Guillaume Destuynder * Nicolas Pierron (JS team) And to the rest of the Security Assurance team!

Slide 34

Slide 34 text

I am everywhere • IRC: yeukhon • twitter: @jwxie • github / bitbucket: yeukhon • email: [email protected]

Slide 35

Slide 35 text

Additional credits • Thanks to @nurikidy for the awesome Mozilla Minion logo. • Thanks to all of you.

Slide 36

Slide 36 text

QA