I read about and tried a lot of MiTM attacks but I just don't get how Port Stealing can be used as a MiTM attack.
In my understanding one can "steal" a Port by sending Ethernet Frames faking the victims source MAC-Address with the goal of confusing the Switch to a point where the CAM-Table associates the attackers Port with the victims MAC-Address which for real is behind another Port.
This will result in the attacker receiving all the Packets which are destined for the victim. But at this point the attacker isn't able to forward the packets to the victim because the switch still thinks the victim is behind the attackers port.
So if I'm right till this point how can Port Stealing be used as a MiTM attack?