<nods head in agreement> Really, if you have tools available, why not use them. If you're to be a good pentester, you can count on building a large tool library (or at least, knowledge thereof.) No sense in re-inventing the wheel, sometimes, if a tool exists that will work, quickly.
(That said, Kismet is doing the same thing that 'waiting' with airodump, etc, would do, in that ANY tool is only going to show you a non-broadcasting SSID when a client connects to it. So, regardless, it's a matter of patience...) But Kismet displays it all, nicely, once it sees it.
~ hayabusa ~
"All men can see these tactics whereby I conquer, but what none can see is the strategy out of which victory is evolved." - Sun Tzu, 'The Art of War'
OSCE, OSCP , GPEN, C|EH