You could force a deauthentication against an already authenticated client, and get the SSID that way (that's how I would get the SSID, by forcing a client to resend the SSID in an authentication packet.) This is also how you go about speeding the process with WEP cracking, etc, as you need enough weak IV's to crack the key, and by deauth'ing attached clients, repeatedly, you force them to resend the SSID and data enough to crack it.
That way, because the client is not yet associated, fully, with the AP's encryption in play, the SSID will be transmitted in the clear, as it would anytime a new client would associate to the AP.
Edit: To answer your last queston:
and what if no one appear to connected to it not in kismet at least !! ?
IF nobody's connected, yet, and you don't already have the SSID, you'll have to wait until someone tries to connect...
Last edited by hayabusa
on Fri Jun 17, 2011 11:13 am, edited 1 time in total.
~ hayabusa ~
"All men can see these tactics whereby I conquer,
but what none can see is the strategy out of which victory is evolved."
- Sun Tzu, 'The Art of War'
OSCE, OSCP (Former - GPEN, C|EH - both expiring / expired)