As can be seen from the title and screenshots, this appears to be a fully featured web backdoor known as WSO 2.5 which allows full control over the target host. - WSO 2.5
Uname:
User:
Php:
Hdd:
Cwd:
Linux pentestvm 4.0.0-kali1-amd64 #1 SMP Debian 4.0.4-1+kali2 (2015-06-03) x86_64 [exploit-db.com]
0 ( root ) Group: 0 ( root )
5.6.9-0+deb8u1 Safe mode: OFF [ phpinfo ] Datetime: 2015-08-15 21:42:53
1863.01 GB Free: 721.42 GB (38%)
/media/root/pentest/web/ drwxrwxrwx [ home ]

Server IP:

Client IP:
[ Sec. Info ][ Files ][ Console ][ Sql ][ Php ][ String tools ][ Bruteforce ][ Network ][ Self remove ]

Server security information

Disabled PHP Functions: none
cURL support: enabled
Supported databases: MySql (5.5.44)

Readable /etc/passwd: yes [view]
Readable /etc/shadow: yes [view]
OS version: Linux version 4.0.0-kali1-amd64 (debian-kernel@lists.debian.org) (gcc version 4.9.2 (Debian 4.9.2-10) ) #1 SMP Debian 4.0.4-1+kali2 (2015-06-03)
Distr name: Kali GNU/Linux 2.0

Userful: gcc, cc, ld, make, php, perl, python, ruby, tar, gzip, bzip2, nc, locate
Danger: chkrootkit, iptables
Downloaders: wget, curl, lwp-mirror

HDD space:
Filesystem      Size  Used Avail Use% Mounted on
udev             10M     0   10M   0% /dev
tmpfs           790M   13M  778M   2% /run
/dev/sda1       288G   12G  262G   5% /
tmpfs           2.0G  480K  2.0G   1% /dev/shm
tmpfs           5.0M     0  5.0M   0% /run/lock
tmpfs           2.0G     0  2.0G   0% /sys/fs/cgroup
tmpfs           395M   28K  395M   1% /run/user/0
/dev/sdb1       1.9T  1.2T  722G  62% /media/root
Hosts:
127.0.0.1	localhost
127.0.1.1	pentestvm.crowdshield.com	pentestvm

# The following lines are desirable for IPv6 capable hosts
::1     localhost ip6-localhost ip6-loopback
ff02::1 ip6-allnodes
ff02::2 ip6-allrouters

posix_getpwuid ("Read" /etc/passwd)
From
To
Change dir:
Read file:
Make dir: (Writeable)
Make file: (Writeable)
Execute:
Upload file: (Writeable)