The document summarizes the Café Latte attack, which allows retrieving WEP keys from isolated "road warrior" clients. It works by tricking the client into associating with a honeypot access point brought up by the attacker, even when the actual network is not present. This causes the client to generate encrypted packets that can be collected and cracked to recover the WEP key stored in its preferred network list, without needing proximity to the real network. The attack represents an evolution from traditional WEP cracking approaches that required the attacker to be near the target network.