Yep, it's definitely possible. (Ubuntu, Debian, Kali) you used to be able to do it in windows with netstumbler but I don't think it's very well supported anymore. You can accomplish what you want with the aircrack-ng suite. Making a bootable USB is probably the best way to go in your case. I would recommend Kali, because it has everything pre-installed in the image. From the terminal use "airmon-ng start wlan0" (or whatever your card is named, ifconfig will show you) to put your card in monitor mode. Do a "airodump-ng wlanXmon" (where x is the number that airmon-ng outputted for the monitor interface it created.) from the terminal, this will scan through all the channels, stop it with Ctrl+z when you find your target.Then "airodump-ng -c x --bssid xx:xx:xx:xx:xx:xx wlan0mon" fill in the X's, with the channel you found it broadcasting on, and the Mac address of the target AP. It will then show you only that targeted AP, and all the clients that are associated with it on that channel.